Notifications
Clear all
Topic starter
01/07/2022 5:22 pm
An incident responder successfully acquired application binaries off a mobile device for later forensic analysis.
Which of the following should the analyst do NEXT?
- A . Decompile each binary to derive the source code.
- B . Perform a factory reset on the affected mobile device.
- C . Compute SHA-256 hashes for each binary.
- D . Encrypt the binaries using an authenticated AES-256 mode of operation.
- E . Inspect the permissions manifests within each application.
Suggested Answer: C