A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?
a
Upload the binary to an air gapped sandbox for analysis
sending to antivirus vendors