Exam 20: Mobile Device Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ phones have divergent (based upon the phone)feature sets.The core features usually were phone,e-mail,text,and camera.

Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Verified

Feature

When working on electronic devices,what should you use to dissipate any static charge that might damage electronic chips?

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

D

All mobile devices use SIM cards.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

False

SD cards and SIM cards perform the same way.

(True/False)
4.8/5
(34)

Logical extractions are useful only when the physical option is not available because of the device itself.

(True/False)
4.9/5
(38)

It may not be possible to recover deleted file items from a mobile device such as e-mails,texts,and photos.

(True/False)
4.8/5
(34)

One interesting aspect of mobile device forensics is geolocation.Some devices and many apps report out the geographical location of the device.That can make it much easier to track the owner's movements.

(True/False)
4.7/5
(35)

When a mobile device is set to use WiFi,it will recognize any WiFi network in its range but may not be able to join the network because of the security settings on the WiFi access point-the mobile device will see it and note that it exists.When that happens,the device takes note of the network and logs it.

(True/False)
4.8/5
(51)

Since the ________,the concepts of handoff and frequency reuse allowed users to move between cells without dropping calls.

(Multiple Choice)
4.8/5
(30)

Each SIM has an international mobile subscriber identity (IMSI)number that associates the phone with the subscriber's mobile ________.

(Short Answer)
4.9/5
(40)

Even though some mobile devices are really small computers with computer-like operating systems,they can usually be examined using typical computer forensic tools.

(True/False)
4.9/5
(36)

What type of network devices started using operating systems?

(Multiple Choice)
4.9/5
(30)

What does SIM stand for?

(Multiple Choice)
4.9/5
(34)

The Smartphone was developed under which technology?

(Multiple Choice)
4.7/5
(35)

If there is a GPS capability on a smartphone,how might the investigator use it in the investigation?

(Essay)
4.8/5
(40)

2G appeared in the 1990s using two standards: GSM & CDMA.

(True/False)
4.9/5
(40)

Describe the two different types of chain of evidence and how they can be used in the investigative process.

(Essay)
4.8/5
(27)

Since the 1960s,the concepts of handoff and frequency reuse allowed users to move between ________ without dropping a call.

(Short Answer)
4.9/5
(27)

By cloning the SIM card,the investigator retains a perfect copy for evidentiary purposes.

(True/False)
4.7/5
(38)

From a forensic perspective it is a toss-up as to how much data you may be able to extract from a 2G device.

(True/False)
4.9/5
(25)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)