Multiple Choice
An incident responder successfully acquired application binaries off a mobile device for later forensic analysis. Which of the following should the analyst do NEXT?
A) Decompile each binary to derive the source code.
B) Perform a factory reset on the affected mobile device.
C) Compute SHA-256 hashes for each binary.
D) Encrypt the binaries using an authenticated AES-256 mode of operation.
E) Inspect the permissions manifests within each application.
Correct Answer:

Verified
Correct Answer:
Verified
Q38: A security analyst is reviewing the following
Q39: A company is moving from the use
Q40: An analyst is reviewing the following code
Q41: A security technician is testing a solution
Q42: A security analyst has received information from
Q44: A security analyst needs to reduce the
Q45: A security analyst at a technology solutions
Q46: A security analyst is required to stay
Q47: During an incident, a cybersecurity analyst found
Q48: A user's computer has been running slowly