Exam 20: Mobile Device Forensics
Exam 1: Introduction106 Questions
Exam 2: The Crime Scene131 Questions
Exam 3: Physical Evidence72 Questions
Exam 4: Crime Scene Reconstruction: Blood Stain Pattern Analysis89 Questions
Exam 5: Death Investigation108 Questions
Exam 6: Fingerprints101 Questions
Exam 7: Forensic Biometrics83 Questions
Exam 8: The Microscope88 Questions
Exam 9: Firearms, tool Marks, and Other Impressions81 Questions
Exam 10: Matter, light, and Glass Examination106 Questions
Exam 11: Hairs and Fibers101 Questions
Exam 12: Drugs127 Questions
Exam 13: Forensic Toxicology92 Questions
Exam 14: Metals, paint, and Soil84 Questions
Exam 15: Forensic Serology77 Questions
Exam 16: DNA: the Indispensable Forensic Science Tool97 Questions
Exam 17: Forensic Aspects of Fire and Explosion Investigation126 Questions
Exam 18: Document Examination58 Questions
Exam 19: Computer Forensics98 Questions
Exam 20: Mobile Device Forensics69 Questions
Select questions type
________ phones have divergent (based upon the phone)feature sets.The core features usually were phone,e-mail,text,and camera.
Free
(Short Answer)
4.7/5
(33)
Correct Answer:
Feature
When working on electronic devices,what should you use to dissipate any static charge that might damage electronic chips?
Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
D
Logical extractions are useful only when the physical option is not available because of the device itself.
(True/False)
4.9/5
(38)
It may not be possible to recover deleted file items from a mobile device such as e-mails,texts,and photos.
(True/False)
4.8/5
(34)
One interesting aspect of mobile device forensics is geolocation.Some devices and many apps report out the geographical location of the device.That can make it much easier to track the owner's movements.
(True/False)
4.7/5
(35)
When a mobile device is set to use WiFi,it will recognize any WiFi network in its range but may not be able to join the network because of the security settings on the WiFi access point-the mobile device will see it and note that it exists.When that happens,the device takes note of the network and logs it.
(True/False)
4.8/5
(51)
Since the ________,the concepts of handoff and frequency reuse allowed users to move between cells without dropping calls.
(Multiple Choice)
4.8/5
(30)
Each SIM has an international mobile subscriber identity (IMSI)number that associates the phone with the subscriber's mobile ________.
(Short Answer)
4.9/5
(40)
Even though some mobile devices are really small computers with computer-like operating systems,they can usually be examined using typical computer forensic tools.
(True/False)
4.9/5
(36)
What type of network devices started using operating systems?
(Multiple Choice)
4.9/5
(30)
If there is a GPS capability on a smartphone,how might the investigator use it in the investigation?
(Essay)
4.8/5
(40)
Describe the two different types of chain of evidence and how they can be used in the investigative process.
(Essay)
4.8/5
(27)
Since the 1960s,the concepts of handoff and frequency reuse allowed users to move between ________ without dropping a call.
(Short Answer)
4.9/5
(27)
By cloning the SIM card,the investigator retains a perfect copy for evidentiary purposes.
(True/False)
4.7/5
(38)
From a forensic perspective it is a toss-up as to how much data you may be able to extract from a 2G device.
(True/False)
4.9/5
(25)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)