Exam 20: Digital Evidence on Mobile Devices
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
The forensic examiner's best option for the most complete collection of data from a mobile device is to make a physical acquisition.
Free
(True/False)
4.8/5
(31)
Correct Answer:
True
Forensic examiners should be aware that a mobile device with a blank or broken display:
Free
(Multiple Choice)
4.9/5
(43)
Correct Answer:
B
Discuss methodologies for processing a crime scene involving mobile devices. Take into account the special issues relating to mobile devices.
Free
(Essay)
4.8/5
(29)
Correct Answer:
search for media and SIM cards, seizing related peripherals and communication cables, charging stands, etc., how to isolate the device from the network(s), powering off issues.
One drawback of mobile device examination is that when a user deletes data on a mobile device that data is never recoverable.
(True/False)
4.8/5
(33)
One of the difficulties in processing mobile devices is that the manufacturers always use proprietary storage formats.
(True/False)
4.8/5
(42)
Why is it important to collect charging cables when seizing mobile devices?
(Multiple Choice)
4.9/5
(39)
Which of the following is NOT one of the methods mobile devices use to communicate?
(Multiple Choice)
4.7/5
(36)
Which of the following are methods for preserving mobile devices by isolating them from the networks?
(Multiple Choice)
4.9/5
(32)
When analyzing a GPS-enabled mobile device, it is often possible to recover location information, import it into mapping software, and display the locations on a map.
(True/False)
4.9/5
(37)
Mobile devices have become a promising new target for malware developers.
(True/False)
4.7/5
(37)
Best practices for seizing a mobile device is to power the device off and remove the battery so that no new connections are made over the network.
(True/False)
4.7/5
(34)
There are currently no forensic tools available for processing mobile devices.
(True/False)
4.9/5
(36)
Although mobile devices may connect to networks, WiFi and Bluetooth connections, and desktops synchronizing software, the forensic examiner should focus entirely on the mobile device itself.
(True/False)
4.9/5
(43)
Certain data on mobile devices, particularly phone numbers, are stored in nibble-reversed format.
(True/False)
4.9/5
(39)
Something forensic examiners need to keep in mind when trying to brute force an SIM card that has had a PIN set is that the card will lock after the second failed attempt.
(True/False)
4.7/5
(32)
One major advantage of mobile devices from a forensic perspective is that:
(Multiple Choice)
4.8/5
(30)
Certain data on mobile devices, in particular phone numbers, are stored in "nibble reversed" format. In that case, the phone number 12025437078 would be displayed as:
(Multiple Choice)
4.9/5
(30)
The primary reason that brute-force methods are not used when trying to access an SIM card with the PIN set is:
(Multiple Choice)
4.8/5
(31)
One of the dangers (from a forensic standpoint) of mobile devices is:
(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)