Exam 20: Digital Evidence on Mobile Devices

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The forensic examiner's best option for the most complete collection of data from a mobile device is to make a physical acquisition.

Free
(True/False)
4.8/5
(31)
Correct Answer:
Verified

True

Forensic examiners should be aware that a mobile device with a blank or broken display:

Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
Verified

B

Discuss methodologies for processing a crime scene involving mobile devices. Take into account the special issues relating to mobile devices.

Free
(Essay)
4.8/5
(29)
Correct Answer:
Verified

search for media and SIM cards, seizing related peripherals and communication cables, charging stands, etc., how to isolate the device from the network(s), powering off issues.

One drawback of mobile device examination is that when a user deletes data on a mobile device that data is never recoverable.

(True/False)
4.8/5
(33)

One of the difficulties in processing mobile devices is that the manufacturers always use proprietary storage formats.

(True/False)
4.8/5
(42)

Why is it important to collect charging cables when seizing mobile devices?

(Multiple Choice)
4.9/5
(39)

Which of the following is NOT one of the methods mobile devices use to communicate?

(Multiple Choice)
4.7/5
(36)

Which of the following are methods for preserving mobile devices by isolating them from the networks?

(Multiple Choice)
4.9/5
(32)

When analyzing a GPS-enabled mobile device, it is often possible to recover location information, import it into mapping software, and display the locations on a map.

(True/False)
4.9/5
(37)

Mobile devices have become a promising new target for malware developers.

(True/False)
4.7/5
(37)

Best practices for seizing a mobile device is to power the device off and remove the battery so that no new connections are made over the network.

(True/False)
4.7/5
(34)

There are currently no forensic tools available for processing mobile devices.

(True/False)
4.9/5
(36)

Although mobile devices may connect to networks, WiFi and Bluetooth connections, and desktops synchronizing software, the forensic examiner should focus entirely on the mobile device itself.

(True/False)
4.9/5
(43)

Certain data on mobile devices, particularly phone numbers, are stored in nibble-reversed format.

(True/False)
4.9/5
(39)

Something forensic examiners need to keep in mind when trying to brute force an SIM card that has had a PIN set is that the card will lock after the second failed attempt.

(True/False)
4.7/5
(32)

One major advantage of mobile devices from a forensic perspective is that:

(Multiple Choice)
4.8/5
(30)

Certain data on mobile devices, in particular phone numbers, are stored in "nibble reversed" format. In that case, the phone number 12025437078 would be displayed as:

(Multiple Choice)
4.9/5
(30)

The primary reason that brute-force methods are not used when trying to access an SIM card with the PIN set is:

(Multiple Choice)
4.8/5
(31)

Mobile devices are considered to be a type of embedded system.

(True/False)
4.8/5
(39)

One of the dangers (from a forensic standpoint) of mobile devices is:

(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)