An incident responder successfully acquired application binaries off a mobile device for later forensic analysis. Which of the following should the analyst do NEXT?
A) Decompile each binary to derive the source code.
B) Perform a factory reset on the affected mobile device.
C) Compute SHA-256 hashes for each binary.
D) Encrypt the binaries using an authenticated AES-256 mode of operation.
E) Inspect the permissions manifests within each application.
Correct Answer:
Verified
Q25: A development team is testing a new
Q26: A security analyst is building a malware
Q27: A security analyst is reviewing the following
Q28: A monthly job to install approved vendor
Q29: As part of an exercise set up
Q31: Bootloader malware was recently discovered on several
Q32: For machine learning to be applied effectively
Q33: A Chief Information Security Officer (CISO) is
Q34: A security analyst has received information from
Q35: A network attack that is exploiting a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents