An analyst is examining a malicious JavaScript file and finds a long, concatenated string of `String.fromCharCode(104,101,108,108,111)`. This code, when executed, produces a readable string. What is the primary purpose of this technique?
-
A
To evade signature-based detection by network security devices.
-
B
To compress the script to reduce bandwidth usage.
-
C
To ensure compatibility with older web browsers.
-
D
To execute code with elevated system privileges.