Chapter 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

SD cards have a capacity up to which of the following?

64 GB

The term TDMA refers to which of the following?

A technique of dividing a radio frequency so that multiple users share the same channel. A specific cellular network standard

Which of the following categories of information is stored on a SIM card?

Cell data Service-related data

IETF is the organization setting standards for 5G devices.

False

The uRLLC 5G category focuses on communications in smart cities.

False

When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place.

False

What's the most commonly used cellular network worldwide?

GSM

Which of the following is a mobile forensics method listed in NIST guidelines.

Hex dumping Logical extraction Physical extraction

Which of the following relies on a central database that tracks account data, location data, and subscriber information?

MSC

According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked?

Remove the passcode Isolate the device from the network Disable the screen lock

In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices?

Riley v. California

GSM divides a mobile station into ________ and ____

SIM card and ME

Most SIM cards allow ________ access attempts before locking you out.

Three

Mobile device information might be stored on the internal memory or the SIM card.

True

Placing it in paint and using Faraday bags are two ways you can isolate a mobile device from incoming signals.

True

Remote wiping of a mobile device can result in which of the following?

Removing account information Deleting contacts Returning the phone to the original factory settings

SIM card readers can alter evidence by showing that a message has been read when you view it.

True

The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices.

True

Typically, you need a search warrant to retrieve information from a service provider?

True


Conjuntos de estudio relacionados

Section 1: Risk Management (CIA of security, Threat actors, What is risk?, Managing Risk)

View Set

9.4.3 IPv4 and Network Segmentation Quiz

View Set

Quiz Chapter 11: Creating Products and Pricing Strategies to Meet Customers' Needs, Chapter 12: Distributing and Promoting Products and Services

View Set

Cloud Guru: Google Cloud Professional Cloud Security Engineer

View Set

CH 1 - Completing the Application, Underwriting, and Delivering the Policy

View Set

Quiz: Emptying and Changing an Ostomy Appliance

View Set

Chapter 3 Review Sensation and Perception

View Set