Module 12 Quiz - Digital Forensics
SD cards have a capacity up to which of the following? 500 MB 64 GB 100 MB 4 MB
64 GB
According to SANS DFIR Forensics, which of the following tasks should you perform if a mobile device is on and unlocked? Disable the screen lock. Isolate the device from the network. Remove the passcode. All of the above
All of the above
Remote wiping of a mobile device can result in which of the following? Returning the phone to the original factory settings Deleting contacts Removing account information All of the above
All of the above
Which of the following is a mobile forensics method listed in NIST guidelines? Physical extraction Logical extraction Hex dumping All of the above
All of the above
Which of the following categories of information is stored on a SIM card? a: Call data b: Service-related data Both a and b None of the above
Both a and b
The term TDMA refers to which of the following? a: A technique of dividing a radio frequency so that multiple users share the same channel b: A proprietary protocol developed by Motorola c: A specific cellular network standard Both a and c
Both a and c
IETF is the organization setting standards for 5G devices.
False
The uRLLC 5G category focuses on communications in smart cities.
False
When acquiring a mobile device at an investigation scene, you should leave it connected to a laptop or tablet so that you can observe synchronization as it takes place.
False
What's the most commonly used cellular network worldwide? CDMA EDGE GSM TDMA
GSM
Which of the following relies on a central database that tracks account data, location data, and subscriber information? BTS MSC BSC None of the above
MSC
In which of the following cases did the U.S. Supreme Court require using a search warrant to examine the contents of mobile devices? Riley v. California Dearborn v. Ohio Smith v. Oregon Miles v. North Dakota
Riley v. California
GSM divides a mobile station into ______ and ______. SIM card and EEPROM SIM card and ME RAM and SIM RAM and ME
SIM card and ME
Most SIM cards allow ______ access attempts before locking you out. One Four Three Two
Three
Mobile device information might be stored on the internal memory or the SIM card.
True
Placing it in paint cans and using Faraday bags are two ways you can isolate a mobile device from incoming signals.
True
SIM card readers can alter evidence by showing that a message has been read when you view it.
True
The Internet of Things includes radio frequency identification (RFID) sensors as well as wired, wireless, and mobile devices.
True
Typically, you need a search warrant to retrieve information from a service provider.
True