Module 12 Quiz - Digital Forensics

¡Supera tus tareas y exámenes ahora con Quizwiz!

SD cards have a capacity up to which of the following? 500 MB 64 GB 100 MB 4 MB

64 GB

According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked? Disable the screen lock. Isolate the device from the network. Remove the passcode. All of the above

All of the above

Remote wiping of a mobile device can result in which of the following? Returning the phone to the original factory settings Deleting contacts Removing account information All of the above

All of the above

Which of the following is a mobile forensics method listed in NIST guidelines? Physical extraction Logical extraction Hex dumping All of the above

All of the above

Which of the following categories of information is stored on a SIM card? a: Call data b: Service-related data Both a and b None of the above

Both a and b

The term TDMA refers to which of the following? a: A technique of dividing a radio frequency so that multiple users share the same channel b: A proprietary protocol developed by Motorola c: A specific cellular network standard Both a and c

Both a and c

IETF is the organization setting standards for 5G devices.

False

The uRLLC 5G category focuses on communications in smart cities.

False

When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place.

False

What's the most commonly used cellular network worldwide? CDMA EDGE GSM TDMA

GSM

Which of the following relies on a central database that tracks account data, location data, and subscriber information? BTS MSC BSC None of the above

MSC

In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices? Riley v. California Dearborn v. Ohio Smith v. Oregon Miles v. North Dakota

Riley v. California

GSM divides a mobile station into ______ and ______. SIM card and EEPROM SIM card and ME RAM and SIM RAM and ME

SIM card and ME

Most SIM cards allow ______ access attempts before locking you out. One Four Three Two

Three

Mobile device information might be stored on the internal memory or the SIM card.

True

Placing it in paint cans and using Faraday bags are two ways you can isolate a mobile device from incoming signals.

True

SIM card readers can alter evidence by showing that a message has been read when you view it.

True

The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices.

True

Typically, you need a search warrant to retrieve information from a service provider.

True


Conjuntos de estudio relacionados

Ethical and Appropriate Uses of Administrative Data for Research and Evaluation

View Set

PHARM PRACTICE QUESTIONS CHAP 15

View Set

Lesson 12/Chapter 27: Human Development and Inheritance

View Set

SOCIOLOGY EXAM 2: Chapter 9: Constructing Gender and Sexuality

View Set

Chapter 12: Demand Planning & Forecasting

View Set

Ch 4 Social Statistics: Variability

View Set

Economic Statistical Analysis Final Review

View Set