Chapter 10, 11, and 14 Network

¡Supera tus tareas y exámenes ahora con Quizwiz!

IEEE ________ is a part of the dedicated short-range communications and supports wireless access in vehicles

802.11p IEEE 802.11p is part of the dedicated short-range communications (DSRC) system and is a standard for adding wireless access in vehicle environments (WAVE)

________ Vehicle-to-Everything is a 3GPP standard for use with smart vehicles on 4G and 5G networks.

Cellular Cellular Vehicle-to-Everything (C-V2X) is a 3GPP standard for use with smart vehicles on 4G and 5G networks. This is an alternative standard to the IEEE 802.11p standard for V2V (vehicle-to-vehicle) communications.

There are approximately 200 million CCTV cameras in ________, many of which have facial recognition capabilities and assist law enforcement who are often seen wearing smart glasses.

China Police in China have been using smart glasses, which have facial recognition capabilities. There are approximately 200 million CCTV cameras in China, many of which have facial recognition capabilities.

The prefix for digital images found on a Nikon camera is ________.

DSCN DSCN stands for Digital Still Capture Nikon and is one way of connecting an image with a Nikon camera.

BR Software produces a free tool called BR's ________ that can extract the EXIF data from a folder of photos and then save that metadata to a comma-separated values (CSV) file.

EXIFextracter EXIF data can be manipulated.

An Android emulator is helpful to investigators because it uses a Java de-compiler to reveal the source code.

False A an emulator can also benefit investigators who are interested in viewing the behavior of an app—especially if an app potentially contains malware.

A dynamic analysis of a mobile application generally refers to a code review, which includes the app manifest.

False A dynamic analysis generally refers to analyzing the application once it has been executed. This may include packet captures and monitoring DNS connections.

A megapixel is a billion pixels. There are so many pixels found in digital photos today that file sizes become extremely large

False A megapixel is a million pixels. You can determine the file size for different photograph image types based on the size of the megapixels at http://web.forret.com/tools/megapixel.asp

iOS app developers may access an iPhone's UDID (unique device identifier) and use it to track app users.

False App developers may not use an iPhone's UDID. They are however welcome to utilize the official Apple advertising platform to track app users.

The file system utilized by flash memory is NTFS because of its increased security over FAT.

False Flash memory uses the FAT file system. As the resolution of digital photographs has increased over time, it has become necessary to use a more robust version of FAT. Therefore, higher-end cameras now use exFAT as the de facto file system.

Evidence from Amazon's Echo speaker device has not been used in investigations yet but could be used in the future.

False James Bates, Bentonville, Arkansas, was arrested on suspicion of murder and Bates' defense attorney gave permission for Amazon to release audio files, obtained from his Echo speaker, to prosecutors.

PPG is the use of electrical current to determine heart rate and heart arrhythmia.

False Photoplethysmography (PPG) is the use of light to determine blood flow based on rates of light absorption.

The Design rule for Camera File system (DCF) was developed by Apple to facilitate the exchange of images between digital still cameras and other devices for viewing digital photographs.

False The Design rule for Camera File system (DCF) was developed by the Japan Electronic Industry Development Association (JEIDA).

The SQLite database file associated with Skype is db.

False The SQLite database file associated with Skype is main.db.

When viewing profiles on Tinder, swiping left on a profile means that you like a person.

False The app allows the user to "Swipe Right" if he/she wishes to connect with another individual, or "Swipe Left" if he/she are not interested.

The introduction of 5G is unlikely to impact law enforcement's use of StingRay devices.

False The introduction of 5G will see enhanced privacy protections, including the encryption of the device's IMSI (international mobile subscriber identity). This will be problematic for IMSI-catchers, like the Harris Corporation's StingRay device.

A raster graphic is composed of curves, lines, or shapes based on mathematical formulae rather than pixels.

False This describes a vector graphic. An investigator is more likely to encounter raster graphics than vector graphics.

The Extensible Metadata Platform (XMP) is the metadata associated with digital pictures. The Japan Electronic Industries Development Association (JEIDA) released this format of photography metadata in 1995.

False This describes the Exchangeable Image File Format (EXIF). Most smart devices today use the EXIF data format in the photographs they produce.

Tinder and other apps allow the user to connect to other social media accounts using "deep-connections".

False Tinder and other apps allow users to connect to other social media accounts, like Instagram, using "deep-linking".

With the introduction of Wi-Fi 6, consumers should immediately upgrade to Wi-Fi 6 enabled routers.

False While Wi-Fi 6 is now a reality, consumers should understand that some Internet service providers (ISPs) may not support the faster speeds associated with Wi-Fi 6.

Facebook purchased ________, an application that enables the users to share photos and video content with their social network.

Instagram Instagram is available for traditional computers, smartphones, and tablets.

On an iPhone, user data, including cache, cookies, and other personal data, are generally found in the ________ folder

Library The Library folder is where an investigator will find user data, including cache, cookies, and other personal information.

________ refers to techniques that can enhance edges and sharpen objects in an image.

Linear filtering Linear filtering techniques can make objects in an image less blurred.

The Android ________ file contains the application's package name, its functionality, permissions, hardware, and software requirements for installation

Manifest The name of the file in question is "AndroidManifest.xml". The most important part of this file, from a forensics perspective, are the permissions.

Which of the following is NOT a medium used for storing digital images?

None of the below information All these media, (internal memory, SD card, and CompactFlash Card) as well as MMC, can be used to store digital images.

Automatic ________ plate recognition is a technology that uses optical character recognition to read vehicle registration plates and record the location of the vehicle

Number Automatic number plate recognition (ANPR) is a technology that uses optical character recognition to read vehicle registration plates and record the location of the vehicle. It is a term used in the United Kingdom.

On an iPhone, usernames and passwords can sometimes be found unencrypted in the ________ folder.

Preferences In the Preferences folder, an investigator may discover usernames and passwords stored in plaintext

A ________ database is a relational database that is the preferred storage for mobile apps.

SQLite A SQLite database is a relational database that is the preferred storage for data associated with mobile apps.

A VIN will identify the plant where a vehicle was manufactured.

True A VIN will include a manufacturer identifier, vehicle descriptor (vehicle attributes), and vehicle identifier (model year, plant code, manufacturer number and sequential number).

A raster graphic is a pixelated image associated with pictures found on a computer or retrieved from a digital camera.

True A raster graphic consists of a grid of pixels.

Today the technology exists to alert dispatch to when a police officer has removed his gun from his holster

True A smart holster sensor, which is built into a gun holster, can detect when a firearm has been removed from its holster and automatically alert dispatch.

Facebook is probably the world's most popular social networking service. Users create a profile and communicate with their network friends, family, and organizational contacts either online or through the Facebook mobile application.

True An important aspect of this communication is the sharing of digital photographs.

Cropping is the process of removing unwanted portions of an image.

True Cropping is not always advisable unless the investigator can show a jury the original and demonstrate the need to crop a photograph.

A Tagged Image File Format (TIFF) is a raster image file format that uses lossless data compression. Similar to a GIF, a TIFF uses the Lempel-Ziv-Welch (LZW) lossless data compression algorithm.

True It was developed by Aldus but is now controlled by Adobe Systems. TIFF was originally an ideal format for scanners.

In some countries, humans have the option to have a micro-chip placed under their skin.

True Micro-chipping humans has become popular in Sweden, where the technology enables people to enter an apartment, access a workplace, make purchases from vending machines and stored emergency contact information.

The goal of Minimization of Drive Testing is used to improve consumer experience and will allow mobile devices to provide data on signal strength as opposed to telecom engineers driving around neighborhoods.

True Minimization of Drive Testing (MDT) is being discussed as an important way to measure consumer satisfaction on a cellular network, including new 5G networks. For example, instead of Verizon or AT&T engineers driving around and measuring network signals and performance, the cellular providers have sought to gather performance metrics directly from consumer cellular devices, thereby minimizing the need to drive and test signal strength.

Robtex allows investigators to quickly map out the domains associated with Tinder.

True Robtex (robtex.com) allows researchers and investigators to quickly map out the domains and servers associated with a company's website or mobile application.

A zero-day exploit is malware that, when discovered, there is no existing patch or anti-virus solution.

True The term "zero-day" refers to the fact that there are zero days to prepare for the malware that is released and there is no existing patch.

Some police body worn cameras can automatically activate the camera.

True There are body worn cameras that can automatically activate when a police officer removes his gun from its holster.

Tinder offers a Web-based version of their app

True Tinder also offers a Web-based version of their service at gotinder.com and tinder.com.

A refrigerator could be an example of an IoT device if it connects to the Internet.

True While examples of IoT devices can include cameras and thermostats, there are IoT appliances, including refrigerators, ovens, washing machines and dryers.

Wireshark is a network analysis tool for Windows PC users.

True Wireshark is a network analysis tool for Windows PC. It can perform packet captures and DNS analysis

A digital photograph is an image taken with a camera and stored as a computer file.

True Unlike older cameras that exposed photographic film to light, a digital camera creates an image with a light-sensitive lens.

_______ has developed gun sensors that utilize three-axis telemetry to monitor the position of a police officer's gun.

Yardarm Yardarm is one of several companies that have developed gun sensors that utilize three-axis telemetry to monitor the position of a police officer's gun

A ________ file is a packet of data, from a wireless network, that can be obtained using Wireshark.

pcap A pcap file is a wireless packet that contains user data and network data related to the sender and receiver of that data.


Conjuntos de estudio relacionados

The Iroquois Creation Myth: "The World on Turtle's Back"

View Set

Anatomy - Skeletal Muscle Review

View Set

Chapter 1-7 End of Chapter Questions

View Set

Health Assessment II Final Review PP

View Set

preparing a multiple-step income statement

View Set