Chapter 12 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

True

In mobile device forensics it may be necessary to gather associated laptops and peripheral devices. True False

Place it in a Faraday bag

It may be necessary to isolate a mobile device in order to prevent attack or tampering. Which of the following is method to isolate the device? Place it in a Faraday bag Wrap it in aluminum foil Place it in an evidence bag Place it in your backpack

True

Portability of information is what makes SIM cards so versatile. True False

The corporate data they hold

Video game systems can be a target for attackers because of all of the following EXCEPT: The methods to retrieve information is easy to find The powerful processing systems they contain The account information used on them The corporate data they hold

Hierarchical

What structure is used for the file system on a SIM card? Circular Volatile Linear Hierarchical

The device's voicemail messages

Which of the following may require a separate subpoena or search warrant in order to access. The device's SIM card The device's internal memory The device's voicemail messages The device's removable memory card

False

Because BYOD has become so common, investigators don't have to worry about how to keep personal data separate from corporate case evidence. True False

Location data Photos, videos, and audio files Calendars and address books

Cell phones can be very valuable to an investigation because they often contain some or all of which of the following? Social Security Numbers Location data Photos, videos, and audio files Calendars and address books

False

Mobile device investigations is relatively easy. True False

Smartwatches Smart Phones

Mobile devices is a broad category that includes which of the following devices? Smartwatches Dedicated GPS units Smart phones Laptops

True

Most people store more information on their smartphones and tablets than on their computers. True False

Logical extraction Micro read Physical extraction

NIST guidelines list six types of mobile forensics methods. Which of these are on that list? Chipsetting Logical extraction Micro read Physical extraction


Conjuntos de estudio relacionados

Unit 3 Intro to Trig (Chap 4.1-4.4 in Book)

View Set

Nclex-exam-gastrointestinal-disorders - 30-items

View Set

FINA 3320 Review End of Chapter Math

View Set