Computer Forensics Chapter 12

Ace your homework & exams now with Quizwiz!

In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices? a. Riley v California b. Miles v North Dakota c. Dearborn v Ohio d. Smith v Oregon

a. Riley v California

Mobile device information might be stored on the internal memory or the SIM card. a. true b. false

a. true

Placing it in paint cans and using Faraday bags are two ways you can isolate a mobile device from incoming signals. a. true b. false

a. true

SIM card readers can alter evidence by showing that a message has been read when you view it. a. true b. false

a. true

The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices. a. true b. false

a. true

Typically, you need a search warrant to retrieve information from a service provider. a. true b. false

a. true

What's the most commonly used cellular network worldwide? a. CDMA b. GSM c. EDGE d. TDMA

b. GSM

Which of the following relies on a central database that tracks account data, location data, and subscriber information? a. BTS b. MSC c. BSC d. none of the above

b. MSC

IETF is the organization setting standards for 5G devices. a. true b. false

b. false

The uRLLC 5G category focuses on communications in smart cities. a. true b. false

b. false

When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place. a. true b. false

b. false

Most SIM cards allow ______ access attempts before locking you out. a. four b. three c. two d. one

b. three

SD cards have a capacity up to which of the following? a. 4MB b. 500MB c. 64GB d. 100 MB

c. 64GB

Which of the following categories of information is stored on a SIM card? a. call data b. service related data c. both a and b d. none of the above

c. both a and b

GSM divides a mobile station into ______ and ______. a. RAM and ME b. RAM and SIM c. SIM card and EEPROM d. SIM card and ME

d. SIM card and ME

According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked? a. disable screen lock b. remove passcode c. isolate device from network d. all of the above

d. all of the above

Remote wiping of a mobile device can result in which of the following? a. deleting contacts b. removing account info c. returning phone to original factory settings d. all of the above

d. all of the above

Which of the following is a mobile forensics method listed in NIST guidelines? a. logical extraction b. hex dumping c. physical extraction d. all of the above

d. all of the above

The term TDMA refers to which of the following? a. a technique of dividing a radio frequency so that multiple users share the same channel b. A proprietary protocol developed by Motorola c. A specific cellular network standard d. both a and c

d. both a and c


Related study sets

115 PrepU Ch.17: Assessment of Respiratory Function

View Set

2010 AP Environmental Science Test

View Set

CH 7 International Arbitrage and Interest Rate Parity

View Set

Chapter 7 - Language of Medicine Online Questions & Answers & TB

View Set

Unit 3: Financial Statements: Module 3: Financial Statements Overview, Lesson 9: The Income Statement, Lesson: 10: The Statement of Retained Earnings, Lesson 11: The Statement of Cash Flows, Lesson: 12: The Statement of Cash Flows, Module 3 Quiz

View Set

pediatric musculoskeletal (not PP)

View Set

Part 2: Topic 12: Absolutism and The French Revolution (1550-1850)

View Set