adplus-dvertising
frame-decoration

Question

In what cases is it possible to recover the actual source-code from program binaries?

a.

When the original developers who created it are unavailable

b.

When the program binaries are in a high-level representation

c.

When the program binaries are in a low-level assembly language code

d.

Both a and b

Posted under Reverse Engineering

Answer: (d).Both a and b Explanation:In some cases, source code is available but the original developers who created it are unavailable. It is also possible to recover the actual source-code (or a similar high-level representation) from the program binaries.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In what cases is it possible to recover the actual source-code from program binaries?

Similar Questions

Discover Related MCQs

Q. How is reverse engineering similar to scientific research?

Q. What is the difference between reverse engineering and scientific research?

Q. What is the definition of reverse engineering?

Q. What is the primary purpose of reverse engineering?

Q. Why might someone conduct reverse engineering?

Q. What was the traditional method of reverse engineering?

Q. What is software reverse engineering?

Q. Why is reverse engineering for the purpose of developing competing products not as popular in the software industry?

Q. What are the two categories of reverse engineering applications in the software world?

Q. What skills are required for software reverse engineering?

Q. What is the most well-known application of reverse engineering in most industries?

Q. Why is reverse engineering for competitive purposes not popular in the software industry?

Q. How is reversing related to computer security?

Q. What is the impact of the Internet on the spread of malicious software?

Q. What is the connection between reversing and computer security?

Q. What is the purpose of malware developers using reversing techniques?

Q. What is the difference between restricted algorithms and key-based algorithms in cryptography?

Q. Why is reversing restricted algorithms not a good way to maintain secrecy?

Q. What is the purpose of reversing private implementations of key-based ciphers?

Q. What is the difference between a restricted algorithm and a key-based algorithm?