Exam 20: Digital Evidence on Mobile Devices
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
One of the difficulties unique to forensic processing of mobile devices is:
(Multiple Choice)
4.8/5
(35)
Discuss the preservation, examination, and analysis issues that make processing mobile devices unique.
(Essay)
4.8/5
(25)
The IEEE standard that specifies a standardized interface for testing integrated circuits, interconnections between components, and a means of observing and modifying circuit activity during a component's operation is:
(Multiple Choice)
4.8/5
(31)
The reason that malware developers are beginning to target mobile devices is:
(Multiple Choice)
4.9/5
(32)
A peculiarity of mobile devices is the format that they store SMS messages, which is:
(Multiple Choice)
4.8/5
(41)
Given the small amount of usable data obtainable from mobile devices, the forensic investigator needs to weigh the value of investing time examining mobile devices.
(True/False)
4.8/5
(28)
Since mobile devices consist of a CPU, memory, storage, and software, the same as traditional computers, they are processed in exactly the same way.
(True/False)
4.9/5
(35)
Powering down a mobile device and removing the battery may cause problems in that:
(Multiple Choice)
4.9/5
(37)
Which of the following is NOT one of the currently available methods for extracting data from mobile devices?
(Multiple Choice)
4.8/5
(30)
It is often possible to perform a forensic analysis of a physical duplicate of mobile devices using file system forensic tools.
(True/False)
4.8/5
(32)
The dynamic nature of mobile device communications presents additional challenges for the forensic examiner.
(True/False)
4.9/5
(37)
Software designed to monitor activities on mobile devices has come to be called:
(Multiple Choice)
4.8/5
(36)
Showing 21 - 32 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)