Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 308 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 308
Topic #: 1
[All 312-50v11 Questions]

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.
What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

  • A. Reverse engineering
  • B. App sandboxing
  • C. Jailbreaking
  • D. Social engineering
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
avatar23
Highly Voted 1 year, 11 months ago
Selected Answer: A
*Reverse engineering is the process of analyzing and extracting the source code of a software or application, and if needed, regenerating it with required modifications. *Reverse engineering is used to disassemble a mobile application to analyze its design flaws and fix any bugs that are residing in it (Module 17 p2519)
upvoted 7 times
...
72ee67e
Most Recent 3 months, 3 weeks ago
Selected Answer: A
A. Reverse engineering
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: A
The correct option is A. Reverse engineering
upvoted 1 times
...
Daniel8660
2 years, 1 month ago
Selected Answer: A
Reverse Engineering Mobile Applications Reverse engineering is the process of analyzing and extracting the source code of a software or application, and if needed, regenerating it with required modifications.Reverse engineering is used to disassemble a mobile application to analyze its design flaws and fix any bugs that are residing in it. (P.2535/2519)
upvoted 4 times
...
JackyLai88
2 years, 1 month ago
Selected Answer: A
Correct Answer should be Reverse Engineering right
upvoted 1 times
...
TroyMcLure
2 years, 2 months ago
Selected Answer: A
This technique is known as Reverse Engineering.
upvoted 1 times
...
gokhansah1n
2 years, 8 months ago
Selected Answer: A
App sandboxing is a security mechanism that helps protect systems and users by limiting the resources that an app can access to its intended functionality on the mobile platform. Often, sandboxing is useful in executing untested code or untrusted programs from unverified or untrusted third parties, suppliers, users, and websites. This enhances security by isolating the app to prevent intruders, system resources, malware such as Trojans and viruses, and other apps from interacting with it. As sandboxing isolates applications from one another, it protects them from tampering with each other; however, malicious applications may exploit vulnerabilities and bypass the sandbox. Answer is Reverse Engineering CEHv11 Module 17 Hacking Mobile Platforms Page 2390 (Search Page 2406)
upvoted 2 times
...
gokhansah1n
2 years, 8 months ago
Selected Answer: A
Reverse engineering is the process of analyzing and extracting the source code of a software or application and, if needed, regenerating it with required modifications. Reverse engineering is used to disassemble a software program or a mobile application to analyze its design flaws and fix any bugs that are residing in it. The technique is also used for discovering underlying vulnerabilities and improving defense strategies against attacks. Reverse engineering can also be used in mobile platforms to create duplicate or clone apps. CEHv11 Module 17 Hacking Mobile Platforms Page 2519 (Search Page 2535)
upvoted 3 times
...
jinjection
3 years, 1 month ago
A: Reverse Engineering
upvoted 3 times
adamwella
2 years, 9 months ago
what's your reasoning? why not app sandboxing ?
upvoted 2 times
AAronEE
2 years, 3 months ago
Correct answer is Reverse Engineering.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...