When utilizing the Mobile Security Framework for analyzing a mobile application, what type of security assessment would leverage its ability to execute and monitor the behavior of the application in a contained environment?
Compliance checking
Static code analysis
Threat modeling
Dynamic analysis