Chap 10,11,12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

E-mail headers contain which of the following information?

-The sender and receiver e-mail addresses -An ESMTP number or reference number -The e-mail servers the message traveled through to reach its destination

In Microsoft Outlook, e-mails are typically stored in which of the following?

.pstand .ostfiles

Most SIM cards allow _____ access attempts before locking you out.

3

SD cards have a capacity up to which of the following?

64 GB

The term TDMA refers to which of the following? (Choose all that apply.)

A technique of dividing a radio frequency so that multiple users share the same channel

Describe two ways you can isolate a mobile device from incoming signals.

Airplane mode, put in paint can , Turing device off

Which of the following categories of information is stored on a SIM card? (Choose all that apply.)

Call data, Service-related data

When searching a victim's computer for a crime committed with a specific e-mail, which of the following provides information for determining the e-mail's originator?

E-Mail Header Firewall log

The uRLLC 5G category focuses on communications in smart cities

False

When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place

False

Whats the most commonly used cellular network worldwide

GMS

List four places where mobile device information might be stored.

Internal memory, SIM card, external/ removable memory cards, the system error

According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked? (Choose all that apply.)

Isolate the device from the network. Disable the screen lock. Remove the passcode.

Which of the following is a mobile forensics method listed in NIST guidelines

Logical extraction Physical extraction Hex dumping

Phishing does which of the following?

Lures users with false promises

Which of the following is a current formatting standard for e-mail?

MIME

Which of the following relies on a central database that tracks account data, location data, and subscriber information

MSC

What's the main piece of information you look for in an e-mail message you're investigating?

Originating e-mail domain or IP address

The Internet of Things includes as well as wired, wireless, and mobile devices.

Radio frequency, identification sensors

Remote wiping of a mobile device can result in which of the following?

Removing account information Enabling a GPS beacon to track the thief Deleting contacts

In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices?

Riley v. California

GSM divides a mobile station into ________ and ____

Sim card and mobile equipment

SIM card readers can alter evidence by showing that a message has been read when you view it.

True

Typically, you need a search warrant to retrieve information from a service provider

True


Ensembles d'études connexes

Types of DNS Records and DNS terms

View Set

lifetime physical health and wellness chapter 3 quiz

View Set

LearningCurve 13d. Prosocial Relations

View Set

Live Virtual Machine Lab 7.1: Module 07 Network Architecture

View Set

Chapter 7 microbiology 113) Which of the following is the best method to sterilize heat-labile solutions? A) dry heat B) autoclave C) membrane filtration D) pasteurization E) freezing Chapter 7 Microbiology

View Set