Chapter 12 Quiz
True
In mobile device forensics it may be necessary to gather associated laptops and peripheral devices. True False
Place it in a Faraday bag
It may be necessary to isolate a mobile device in order to prevent attack or tampering. Which of the following is method to isolate the device? Place it in a Faraday bag Wrap it in aluminum foil Place it in an evidence bag Place it in your backpack
True
Portability of information is what makes SIM cards so versatile. True False
The corporate data they hold
Video game systems can be a target for attackers because of all of the following EXCEPT: The methods to retrieve information is easy to find The powerful processing systems they contain The account information used on them The corporate data they hold
Hierarchical
What structure is used for the file system on a SIM card? Circular Volatile Linear Hierarchical
The device's voicemail messages
Which of the following may require a separate subpoena or search warrant in order to access. The device's SIM card The device's internal memory The device's voicemail messages The device's removable memory card
False
Because BYOD has become so common, investigators don't have to worry about how to keep personal data separate from corporate case evidence. True False
Location data Photos, videos, and audio files Calendars and address books
Cell phones can be very valuable to an investigation because they often contain some or all of which of the following? Social Security Numbers Location data Photos, videos, and audio files Calendars and address books
False
Mobile device investigations is relatively easy. True False
Smartwatches Smart Phones
Mobile devices is a broad category that includes which of the following devices? Smartwatches Dedicated GPS units Smart phones Laptops
True
Most people store more information on their smartphones and tablets than on their computers. True False
Logical extraction Micro read Physical extraction
NIST guidelines list six types of mobile forensics methods. Which of these are on that list? Chipsetting Logical extraction Micro read Physical extraction
