A security analyst has a sample of malicious software and needs to know what the sample does?. The analyst runs the sample in a carefully controlled and monitored virtual machine to observe the software behavior.
Which of the following malware analysis approaches is this?
A . White box testing
B . Fuzzing
C . Sandboxing
D . Static code analysis