When utilizing the Mobile Security Framework for analyzing a mobile application, what type of security assessment would leverage its ability to execute and monitor the behavior of the application in a contained environment?
Dynamic analysis
Static code analysis
Compliance checking
Threat modeling