Module 12 Mobile Device Forensics and the Internet of Anything
Which of the following categories of information is stored on a SIM card?
- Call data - Service-related data
Which of the following is a mobile forensics method listed in NIST guidelines?
- Hex dumping - Physical extraction - Logical extraction
Remote wiping of a mobile device can result in which of the following?
- deleting contacts - removing account info - returning phone to original factory settings
According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked?
- disable screen lock - remove passcode - isolate device from network
Which of the following mobile generations that is widely available as of 2012 offers the fastest data speed?
4G
SD cards have a capacity up to which of the following?
64 GB
Orthogonal Frequency Division Multiplexing (OFDM)
A 4G technology that uses numerous parallel carriers instead of a single broad carrier and is less susceptible to interference.
Telecommunications Industry Association (TIA)
A U.S. trade association representing hundreds of telecommunications companies that works to establish and maintain telecommunications standards.
Global System for Mobile Communications (GSM)
A second-generation cellular network standard; currently the most used cellular network in the world.
electronically erasable programmable read-only memory (EEPROM)
A type of nonvolatile memory that can be reprogrammed electrically, without having to physically access or remove the chip.
Code Division Multiple Access (CDMA)
A widely used digital cell phone technology that makes use of spread-spectrum modulation to spread the signal across a wide range of frequencies.
Enhanced Data GSM Environment (EDGE)
An improvement to GSM technology that enables it to deliver higher data rates. See also Global System for Mobile Communications (GSM).
International Telecommunication Union (ITU)
An international organization dedicated to creating telecommunications standards.
What type of technology is used by devices that wirelessly transmit data at close range?
Bluetooth
Choose the item that is used to define the content of the cell broadcast message.
CBMI
IETF is the organization setting standards for 5G devices.
False
The uRLLC 5G category focuses on communications in smart cities.
False
When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place.
False
What's the most commonly used cellular network worldwide?
GSM
What item would you use to identify the user of a cellular network?
IMSI
Which of the following relies on a central database that tracks account data, location data, and subscriber information?
MSC
smartphones
Mobile telephones with more features than a traditional phone has, including a camera, an e-mail client, a Web browser, a calendar, contact management software, an instant-messaging program, and more.
Subscriber identity module (SIM) cards
Removable cards in GSM phones that contain information for identifying subscribers. They can also store other information, such as messages and call history.
In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices?
Riley v. California
What is used to store a user's mobile phone data?
SIM
GSM divides a mobile station into ______ and ______.
SIM card and ME
Fifth-generation (5G)
The coming generation of mobile device standards, expected to be finalized in 2020.
fourth-generation (4G)
The current generation of mobile phone standards, with technologies that improved speed and accuracy.
third-generation (3G)
The preceding generation of mobile phone standards and technology; had more advanced features and faster data rates than the older analog and personal communications service (PCS) technologies.
Time Division Multiple Access (TDMA)
The technique of dividing a radio frequency into time slots, used by GSM networks; also refers to a cellular network standard covered by Interim Standard (IS) 136. See also Global System for Mobile Communications (GSM).
Most SIM cards allow ______ access attempts before locking you out.
Three
Mobile device information might be stored on the internal memory or the SIM card.
True
Placing it in paint cans and using Faraday bags are two ways you can isolate a mobile device from incoming signals.
True
SIM card readers can alter evidence by showing that a message has been read when you view it.
True
The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices.
True
Typically, you need a search warrant to retrieve information from a service provider.
True
The term TDMA refers to which of the following?
a: A technique of dividing a radio frequency so that multiple users share the same channel c: A specific cellular network standard