Filters
Question type

Study Flashcards

While travelling internationally with a GSM phone, you can pop in a SIM card for the country you're currently in, rather than get a new phone.

A) True
B) False

Correct Answer

verifed

verified

Explain why mobile phone forensics is a challenging task.​

Correct Answer

verifed

verified

Mobile phone forensics is challenging because no single standard exists for how and where phones store messages, although may phones use similar storage schemes. In addition, new phones come out about every six months, and they're rarely compatible with previous models. Therefore, the cables, software, and accessories used for forensics acquisitions can become obsolete in a short time.

​What digital network technology was developed during World War II?


A) ​GSM
B) ​TDMA
C) iDEN
D) CDMA

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Most Code Division Multiple Access networks conform to IS-95. The systems are referred to as CDMAOne, and when they went to 3G service, they became CDMAThree.​

A) True
B) False

Correct Answer

verifed

verified

False

​Describe the two different types of memory typically used by mobile devices.

Correct Answer

verifed

verified

​Memory storage on a mobile device is us...

View Answer

Match the following terms with the correct definition below:? -?A second-generation cellular network standard; currently the most used cellular network in the world.


A) ?Code Division Multiple Access (CDMA)
B) Electronically Erasable Programmable Ready-only Memory (EEPROM) ?
C) ?Fourth-generation (4G)
D) ?Global System for Mobile Communication (GSM)
E) ?Internal Telecommunication Union (ITU)
F) Orthogonal Frequency Division Multiplexing (OFDM) ?
G) ?Personal Digital Assistants (PDAs)
H) Subscriber Identity Mudule (SIM) cards?
I) ?Telecommunication Industry Association (TIA)
J) Third-generation (3G)

K) B) and F)
L) C) and G)

Correct Answer

verifed

verified

​​Most Code Division Multiple Access (CDMA) networks conform to ____________ , created by the Telecommunications Industry Association (TIA) .


A) ​TS-95
B) ​802.11
C) IS-95
D) IS-136

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

GSM refers to mobile phones as "mobile stations" and divides a station into two parts, the __________ and the mobile equipment (ME) .​


A) ​SIM card
B) radio
C) transceiver
D) antenna

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

List the six types of mobile forensics methods as defined by NIST guidelines, and describe each method.

Correct Answer

verifed

verified

​The six types of mobile forensics metho...

View Answer

Because mobile phones are seized at the time of arrest, a search warrant is not necessary to examine the device for information.​

A) True
B) False

Correct Answer

verifed

verified

Match the following terms with the correct definition below:? -?The preceding generation of mobile phone standards technology; had more advanced features and faster data rates than the older analog and personal communication services (PCS) technologies.


A) ?Code Division Multiple Access (CDMA)
B) Electronically Erasable Programmable Ready-only Memory (EEPROM) ?
C) ?Fourth-generation (4G)
D) ?Global System for Mobile Communication (GSM)
E) ?Internal Telecommunication Union (ITU)
F) Orthogonal Frequency Division Multiplexing (OFDM) ?
G) ?Personal Digital Assistants (PDAs)
H) Subscriber Identity Mudule (SIM) cards?
I) ?Telecommunication Industry Association (TIA)
J) Third-generation (3G)

K) G) and J)
L) F) and I)

Correct Answer

verifed

verified

​What method below is not an effective method for isolating a mobile device from receiving signals?


A) ​placing the device into airplane mode
B) ​placing the device into a paint can, preferably one previously containing radio-wave blocking paint
C) turning the device off
D) placing the device into a plastic evidence bag

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Search and seizure procedures for mobile devices are as important as procedures for computers.​

A) True
B) False

Correct Answer

verifed

verified

​Describe the file structure on a SIM card, and discuss what information can be retrieved from a SIM card.

Correct Answer

verifed

verified

The file system for a SIM card is a hierarchical structure. This structure begins with the root of the system (MF). The next level consists of directory files (DF), and under them are files containing elementary data (EF).​ The information that can be retrieved falls into four categories: •Service-related data, such as identifiers for the SIM card and subscriber •Call data, such as numbers dialed •Message information •Location information

Match the following terms with the correct definition below:? -The current generation of mobile phone standards, with technologies that improve speed and accuracy.?


A) ?Code Division Multiple Access (CDMA)
B) Electronically Erasable Programmable Ready-only Memory (EEPROM) ?
C) ?Fourth-generation (4G)
D) ?Global System for Mobile Communication (GSM)
E) ?Internal Telecommunication Union (ITU)
F) Orthogonal Frequency Division Multiplexing (OFDM) ?
G) ?Personal Digital Assistants (PDAs)
H) Subscriber Identity Mudule (SIM) cards?
I) ?Telecommunication Industry Association (TIA)
J) Third-generation (3G)

K) A) and I)
L) B) and F)

Correct Answer

verifed

verified

​What type of mobile forensics method listed by NIST guidelines involves looking at a device's content page by page and taking pictures?


A) ​Manual extraction
B) ​Logical extraction
C) Chip-off
D) Micro read

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

​The ___________________ technology is designed for GSM and Universal Mobile Telecommunications Systems (UMTS) technology, supports 45 Mbps to 144 Mbps transmission speeds.


A) ​MIMO
B) ​LTE
C) UMB
D) WiMAX

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The ________________ tool can be used to view data on CDMA phones, such as those made by LG, Samsung, Sanyo, and others. This utility is available on Windows, Linux, and Mac OS X, and although it is not considered a forensic tool, it can be used in read-only mode.

Correct Answer

verifed

verified

What difficulties might a forensics investigator face when attempting to check information with a service provider that uses third party cloud services?

Correct Answer

verifed

verified

If a service provider is using a cloud s...

View Answer

​When discussing social media forensics on mobile devices, how do the various platforms differ?

Correct Answer

verifed

verified

​Different platforms have different type...

View Answer

Showing 1 - 20 of 50

Related Exams

Show Answer