Which of the follow...
 
Notifications
Clear all

Which of the following should the analyst do NEXT?

1 Posts
1 Users
0 Likes
178 Views
(@cainsmarshall)
Noble Member
Joined: 2 years ago
Posts: 692
Topic starter  

An incident responder successfully acquired application binaries off a mobile device for later forensic analysis.

Which of the following should the analyst do NEXT?

  • A . Decompile each binary to derive the source code.
  • B . Perform a factory reset on the affected mobile device.
  • C . Compute SHA-256 hashes for each binary.
  • D . Encrypt the binaries using an authenticated AES-256 mode of operation.
  • E . Inspect the permissions manifests within each application.

Show Answer Hide Answer

Suggested Answer: C

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: