Today’s SY0-601 CompTIA Security+ Pop Quiz: I didn’t recognize you thereA security analyst has identified a malicious executable, and it appears to have a different internal structure each time it's downloaded. Which of these would BEST describe this technique? Buffer overflow SQL injection Refactoring Race condition Directory traversal It talks in a high pitched voice