Which of the following should the analyst do NEXT?

Posted by: Pdfprep Category: CS0-002 Tags: , ,

An incident responder successfully acquired application binaries off a mobile device for later forensic analysis.

Which of the following should the analyst do NEXT?
A . Decompile each binary to derive the source code.
B . Perform a factory reset on the affected mobile device.
C . Compute SHA-256 hashes for each binary.
D . Encrypt the binaries using an authenticated AES-256 mode of operation.
E . Inspect the permissions manifests within each application.

Answer: C

Leave a Reply

Your email address will not be published.