An analyst is investigating anomalous behavior on a corporate-owned, corporate-managed mobile device with application whitelisting enabled, based on a name string. The employee to whom the device is assigned reports the approved email client is displaying warning messages that can launch browser windows and is adding unrecognized email addresses to the "compose" window. Which of the following would provide the analyst the BEST chance of understanding and characterizing the malicious behavior?
A) Reverse engineer the application binary.
B) Perform static code analysis on the source code.
C) Analyze the device firmware via the JTAG interface.
D) Change to a whitelist that uses cryptographic hashing.
E) Penetration test the mobile application.
Correct Answer:
Verified
Q314: A new security policy states all wireless
Q315: A company relies on an ICS to
Q316: A penetration tester is trying to gain
Q317: A firewall specialist has been newly assigned
Q318: When implementing a penetration testing program, the
Q320: A security researcher is gathering information about
Q321: Ann, a security administrator, is conducting an
Q322: An internal application has been developed to
Q323: As a result of an acquisition, a
Q324: Company leadership believes employees are experiencing an
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents