Chapter 12: Malware Analysis for Incident Response

  1. D
  2. A
  3. B
  4. B