Computer Forensics Chapter 12
In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices? a. Riley v California b. Miles v North Dakota c. Dearborn v Ohio d. Smith v Oregon
a. Riley v California
Mobile device information might be stored on the internal memory or the SIM card. a. true b. false
a. true
Placing it in paint cans and using Faraday bags are two ways you can isolate a mobile device from incoming signals. a. true b. false
a. true
SIM card readers can alter evidence by showing that a message has been read when you view it. a. true b. false
a. true
The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices. a. true b. false
a. true
Typically, you need a search warrant to retrieve information from a service provider. a. true b. false
a. true
What's the most commonly used cellular network worldwide? a. CDMA b. GSM c. EDGE d. TDMA
b. GSM
Which of the following relies on a central database that tracks account data, location data, and subscriber information? a. BTS b. MSC c. BSC d. none of the above
b. MSC
IETF is the organization setting standards for 5G devices. a. true b. false
b. false
The uRLLC 5G category focuses on communications in smart cities. a. true b. false
b. false
When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place. a. true b. false
b. false
Most SIM cards allow ______ access attempts before locking you out. a. four b. three c. two d. one
b. three
SD cards have a capacity up to which of the following? a. 4MB b. 500MB c. 64GB d. 100 MB
c. 64GB
Which of the following categories of information is stored on a SIM card? a. call data b. service related data c. both a and b d. none of the above
c. both a and b
GSM divides a mobile station into ______ and ______. a. RAM and ME b. RAM and SIM c. SIM card and EEPROM d. SIM card and ME
d. SIM card and ME
According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked? a. disable screen lock b. remove passcode c. isolate device from network d. all of the above
d. all of the above
Remote wiping of a mobile device can result in which of the following? a. deleting contacts b. removing account info c. returning phone to original factory settings d. all of the above
d. all of the above
Which of the following is a mobile forensics method listed in NIST guidelines? a. logical extraction b. hex dumping c. physical extraction d. all of the above
d. all of the above
The term TDMA refers to which of the following? a. a technique of dividing a radio frequency so that multiple users share the same channel b. A proprietary protocol developed by Motorola c. A specific cellular network standard d. both a and c
d. both a and c