An analyst is investigating behavior on a corporate-owned, corporate-managed mobile device with application whitelisting enabled, based on a name string. The employee to whom the device is assigned reports the approved email client is displaying warning messages that can launch browser windows and is adding unrecognized email addresses to the "compose" window. Which of the following would provide the analyst the BEST chance of understanding and characterizing the malicious behavior?
A) Reverse engineer the application binary.
B) Perform static code analysis on the source code.
C) Analyze the device firmware via the JTAG interface.
D) Change to a whitelist that uses cryptographic hashing.
E) Penetration test the mobile application.
Correct Answer:
Verified
Q423: A company is migrating systems from an
Q424: After investigating virus outbreaks that have cost
Q425: A penetration test is being scoped for
Q426: A large company with a very complex
Q427: Ann, a member of the finance department
Q429: A security administrator adding a NAC requirement
Q430: A security analyst is inspecting pseudocode of
Q431: To meet a SLA, which of the
Q432: A government contracting company issues smartphones to
Q433: Developers are working on a new feature
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents