Joey Rubino
Quiz by , created more than 1 year ago

This is a midterm study guide. Hopefully all answers were entered correctly :)

996
0
0
Joey Rubino
Created by Joey Rubino almost 8 years ago
Close

Midterm Study 2

Question 1 of 125

1

The first 3 bytes of an XIF file are exactly the same as a TIF file.​

Select one of the following:

  • True
  • False

Explanation

Question 2 of 125

1

Graphics files are created and saved in a graphics editor, such as Microsoft Paint, Adobe Freehand MX, Adobe Photoshop, or Gnome GIMP.​

Select one of the following:

  • True
  • False

Explanation

Question 3 of 125

1

Most digital cameras use the bitmap format to store photos.​

Select one of the following:

  • True
  • False

Explanation

Question 4 of 125

1

When you decompress ​data that uses a lossy compression algorithm, you regain data lost by compression.

Select one of the following:

  • True
  • False

Explanation

Question 5 of 125

1

Each graphics file type has a unique header value.​

Select one of the following:

  • True
  • False

Explanation

Question 6 of 125

1

​How many bits are required to create a pixel capable of displaying 65,536 different colors?

Select one of the following:

  • 8

  • 16

  • 32

  • 64

Explanation

Question 7 of 125

1

Which of the following is not considered to be a non-standard graphics file format?​

Select one of the following:

  • .dxf

  • .tga

  • .rtl

  • .psd

Explanation

Question 8 of 125

1

All TIF files start at offset 0 with what 6 hexadecimal characters?​

Select one of the following:

  • ​2A 49 48

  • FF 26 9B

  • 49 49 2A

  • AC 49 2A

Explanation

Question 9 of 125

1

What kind of graphics file combines bitmap and vector graphics types?​

Select one of the following:

  • metafile

  • ​bitmap

  • jpeg

  • ​tif

Explanation

Question 10 of 125

1

The process of converting raw picture data to another format is called _________________.​

Select one of the following:

  • splicing

  • carving

  • demosaicing

  • ​vector quantization

Explanation

Question 11 of 125

1

What format was developed as a standard for storing metadata in image files?

Select one of the following:

  • ​jpeg

  • ​tif

  • ​exif

  • bitmap

Explanation

Question 12 of 125

1

Which of the following formats is not considered to be a standard graphics file format?

Select one of the following:

  • ​gif

  • ​jpeg

  • ​dxf

  • ​tga

Explanation

Question 13 of 125

1

Select below the utility that is not a lossless compression utility:

Select one of the following:

  • PKZip

  • ​WinZip

  • StuffIt

  • Lzip

Explanation

Question 14 of 125

1

In simple terms, _____________ compression ​discards bits in much the same way rounding off decimal values discards numbers.

Select one of the following:

  • Huffman

  • Lempel-Ziv-Welch (LZW)

  • Vector Quantization

  • ​Adaptive Quantization

Explanation

Question 15 of 125

1

What file type starts at offset 0 with a hexidecimal value of FFD8?​

Select one of the following:

  • ​tiff

  • jpeg

  • xdg

  • bmp

Explanation

Question 16 of 125

1

How many different colors can be displayed by a 24 bit colored pixel?​

Select one of the following:

  • 256

  • 65,536

  • 16,777,216

  • 4,294,967,296

Explanation

Question 17 of 125

1

The _____________ format is a proprietary format used by Adobe Photoshop.

Select one of the following:

  • .tga

  • ​.fh11

  • .svg

  • ​.psd

Explanation

Question 18 of 125

1

For EXIF JPEG files, the hexadecimal value starting at offset 2 is _____________.

Select one of the following:

  • ​FFE0

  • ​FFE1

  • ​FFD8

  • FFD9

Explanation

Question 19 of 125

1

Referred to as a digital negative, the _______ is typically used on many higher-end digital cameras.​

Select one of the following:

  • ​raster file format

  • bitmap file format

  • ​jpeg file format

  • ​raw file format

Explanation

Question 20 of 125

1

The Lempel-Ziv-Welch (LZW) algorithm is used in _____________ compression.​

Select one of the following:

  • ​lossy

  • lossless

  • vector quantization

  • adaptive

Explanation

Question 21 of 125

1

For all JPEG files, the ending hexadecimal marker, also known as the end of image (EOI), is ____________.​

Select one of the following:

  • FFE0

  • FFD8

  • FFD9

  • ​FFFF

Explanation

Question 22 of 125

1

Which graphics file format below is rarely compressed?

Select one of the following:

  • GIF

  • JPEG

  • ​BMP

  • ​None of the above

Explanation

Question 23 of 125

1

When looking at a byte of information in binary, such as 11101100, what is the first bit on the left referred to as?​

Select one of the following:

  • major significant bit (MSB)

  • least significant bit (LSB)

  • ​most significant bit (MSB)

  • ​leading significant bit (LSB)

Explanation

Question 24 of 125

1

What act defines precisely how copyright laws pertain to graphics?

Select one of the following:

  • 1988 Image Ownership Act

  • ​1976 Copyright Act

  • ​1923 Patented Image Act

  • ​1976 Computer Fraud and Abuse Act

Explanation

Question 25 of 125

1

Which of the following is not a type of graphic file that is created by a graphics program?​

Select one of the following:

  • bitmap images

  • ​vector graphics

  • ​metafile graphics

  • raster graphics

Explanation

Question 26 of 125

1

Because attorneys do not have the right of full discovery of digital evidence, it is not possible for new evidence to come to light while complying with a defense request for full discovery.​

Select one of the following:

  • True
  • False

Explanation

Question 27 of 125

1

One of the most critical aspects of digital forensics is validating digital evidence because ensuring the integrity of data you collect is essential for presenting evidence in court.​

Select one of the following:

  • True
  • False

Explanation

Question 28 of 125

1

The advantage of recording hash values is that you can determine whether data has changed.​

Select one of the following:

  • True
  • False

Explanation

Question 29 of 125

1

In private sector cases, like criminal and civil cases, the scope is always defined by a search warrant.​

Select one of the following:

  • True
  • False

Explanation

Question 30 of 125

1

Advanced hexadecimal editors offer many features not available in digital forensics tools, such as hashing specific files or sectors. ​

Select one of the following:

  • True
  • False

Explanation

Question 31 of 125

1

What format below is used for VMware images?

Select one of the following:

  • .vhd

  • .vmdk

  • .s01

  • .aff

Explanation

Question 32 of 125

1

​In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

Select one of the following:

  • NTFS

  • FAT

  • HFSX

  • Ext3fs

Explanation

Question 33 of 125

1

Which password recovery method uses every possible letter, number, and character found on a keyboard?​

Select one of the following:

  • rainbow table

  • ​dictionary attack

  • ​hybrid attack

  • ​brute-force attack

Explanation

Question 34 of 125

1

The goal of recovering as much information as possible can result in ________________, in which an investigation expands beyond the original description because of unexpected evidence found.​

Select one of the following:

  • ​litigation

  • ​scope creep

  • criminal charges

  • ​violations

Explanation

Question 35 of 125

1

Which of the following file systems can't be analyzed by OSForensics?

Select one of the following:

  • ​FAT12

  • Ext2fs

  • HFS+

  • XFS

Explanation

Question 36 of 125

1

In Windows, the ______________ command can be used to both hide and reveal partitions within Explorer.

Select one of the following:

  • format

  • fdisk

  • ​grub

  • diskpart

Explanation

Question 37 of 125

1

Select the tool below that does not use dictionary attacks or brute force attacks to crack passwords:

Select one of the following:

  • ​Last Bit

  • ​AccessData PRTK

  • OSForensics

  • ​Passware

Explanation

Question 38 of 125

1

Within Windows Vista and later, partition gaps are _____________ bytes in length.

Select one of the following:

  • ​64

  • 128

  • 256

  • 512

Explanation

Question 39 of 125

1

Which option below is not a disk management tool?​

Select one of the following:

  • Partition Magic​

  • Partition Master

  • GRUB

  • HexEdit

Explanation

Question 40 of 125

1

Typically, anti-virus tools run hashes on potential malware files, but some advanced malware uses ________________ as a way to hide its malicious code from antivirus tools.​

Select one of the following:

  • ​hashing

  • ​bit-shifting

  • registry edits

  • slack space

Explanation

Question 41 of 125

1

A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.​

Select one of the following:

  • compiler

  • shifter

  • ​macro

  • script

Explanation

Question 42 of 125

1

What letter should be typed into DiskEdit in order to mark a good sector as bad?​

Select one of the following:

  • ​M

  • B

  • T

  • D

Explanation

Question 43 of 125

1

Many commercial encryption programs use a technology called _____________, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure.​

Select one of the following:

  • ​key vault

  • key escrow

  • bump key

  • master key

Explanation

Question 44 of 125

1

What technique is designed to reduce or eliminate the possibility of a rainbow table being used to discover passwords?​

Select one of the following:

  • salted passwords

  • ​scrambled passwords

  • ​indexed passwords

  • master passwords

Explanation

Question 45 of 125

1

When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented?​

Select one of the following:

  • ​Inventory and documentation information should be stored on a drive and then the drive should be reformatted.

  • Start the suspect's computer and begin collecting evidence.

  • The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.​

  • Connect the suspect's computer to the local network so that up to date forensics utilities can be utilized.

Explanation

Question 46 of 125

1

In order to aid a forensics investigation, a hardware or software ______________ can be utilized to capture keystrokes remotely.

Select one of the following:

  • ​keygrabber

  • ​keylogger

  • ​packet capture

  • ​protocol analyzer

Explanation

Question 47 of 125

1

The AccessData program has a hashing database, ________________, which is available only with FTK, and can be used to filter known program files from view and contains the hash values of known illegal files.​

Select one of the following:

  • DeepScan Filter

  • Unknown File Filter (UFF)

  • Known File Filter (KFF)

  • ​FTK Hash Imager

Explanation

Question 48 of 125

1

The term for detecting and analyzing steganography files is _________________.​

Select one of the following:

  • carving

  • steganology

  • ​steganalysis

  • ​steganomics

Explanation

Question 49 of 125

1

A ____________ image file containing software is intended to be bit-stream copied to floppy disks or other external media.​

Select one of the following:

  • fdisk

  • format

  • dd

  • DiskEdit

Explanation

Question 50 of 125

1

The _______________________ maintains a national database of updated file hash values for a variety of OSs, applications, and images, but does not list hash values of known illegal files.​

Select one of the following:

  • ​Open Hash Database

  • HashKeeper Online

  • National Hashed Software Reference

  • National Software Reference Library

Explanation

Question 51 of 125

1

Type 2 hypervisors are typically loaded on servers or workstations with a lot of RAM and storage.​

Select one of the following:

  • True
  • False

Explanation

Question 52 of 125

1

Forensics tools can't directly mount VMs as external drives.​

Select one of the following:

  • True
  • False

Explanation

Question 53 of 125

1

The capability of type 1 hypervisors is limited only by the amount of available RAM, storage, and throughput.​

Select one of the following:

  • True
  • False

Explanation

Question 54 of 125

1

The Honeynet Project was developed to make information widely available in an attempt to thwart Internet and network attackers.​

Select one of the following:

  • True
  • False

Explanation

Question 55 of 125

1

The Sysinternals Handle utility shows only file system activity, but does not show what processes are using files on the file system.

Select one of the following:

  • True
  • False

Explanation

Question 56 of 125

1

What virtual machine software supports all Windows and Linux OSs as well as Macintosh and Solaris, and is provided as shareware?​

Select one of the following:

  • ​KVM

  • ​Parallels

  • Microsoft Virtual PC

  • VirtualBox

Explanation

Question 57 of 125

1

The __________ disk image file format is associated with the VirtualBox hypervisor.​

Select one of the following:

  • .​vmdk

  • ​.hda

  • .vhd

  • ​.vdi

Explanation

Question 58 of 125

1

What Windows Registry key contains associations for file extensions?​

Select one of the following:

  • ​HKEY_CLASSES_ROOT

  • ​HKEY_USERS

  • ​HKEY_LOCAL_MACHINE

  • HKEY_CURRENT_CONFIG

Explanation

Question 59 of 125

1

In VirtualBox, ____________ different types of virtual network adapters are possible, such as AMD and Intel Pro adapters

Select one of the following:

  • 2

  • 4

  • 6

  • 8

Explanation

Question 60 of 125

1

The SANS Investigative Forensics Toolkit (SIFT) appliance can currently only be installed on what version of Ubuntu?​

Select one of the following:

  • 12.04

  • ​13.11

  • 14.04

  • 14.11

Explanation

Question 61 of 125

1

Select below the option that is not a common type 1 hypervisor:​

Select one of the following:

  • ​VMware vSphere

  • ​Microsoft Hyper-V

  • Citirix XenServer

  • Oracle VirtualBox

Explanation

Question 62 of 125

1

The NSA's defense in depth (DiD) strategy contains three modes of protection. Which option below is not one of the three modes?​

Select one of the following:

  • ​People

  • ​Technology

  • ​Operations

  • Management

Explanation

Question 63 of 125

1

​The _______________ command line program is a common way of examining network traffic, which provides records of network activity while it is running, and produce hundreds or thousands of records.

Select one of the following:

  • ​netstat

  • ​ls

  • ​ifconfig

  • ​tcpdump

Explanation

Question 64 of 125

1

Select below the program within the PsTools suite that allows you to run processes remotely:​

Select one of the following:

  • PsService

  • PsPasswd

  • ​PsRemote

  • PsExec

Explanation

Question 65 of 125

1

The ​tcpdump and Wireshark utilities both use what well known packet capture format?

Select one of the following:

  • ​Netcap

  • Pcap

  • Packetd

  • ​RAW

Explanation

Question 66 of 125

1

The ___________________ is a good tool for extracting information from large Libpcap files; you simply specify the time frame you want to examine.

Select one of the following:

  • Tcpdstat

  • Tcpslice

  • ​Ngrep

  • ​tcpdump

Explanation

Question 67 of 125

1

The _____________________ tool is an updated version of BackTrack, and contains more than 300 tools, such as password crackers, network sniffers, and freeware forensics tools.​

Select one of the following:

  • ​Kali Linux

  • Ubuntu

  • ​OSForensics

  • ​Sleuth Kit

Explanation

Question 68 of 125

1

In Windows, what PowerShell cmdlet can be used in conjunction with Get-VM​ to display a virtual machine's network adapters?

Select one of the following:

  • Show-NetworkAdapters

  • ​Query-ipconfig

  • ​Get-VMNetworkAdapter

  • Dump-Netconfig

Explanation

Question 69 of 125

1

What file type below, associated with VMWare, stores VM paging files that are used as RAM for a virtual machine?​

Select one of the following:

  • ​.nvram

  • ​.vmem

  • .​vmpage

  • .vmx

Explanation

Question 70 of 125

1

What processor instruction set is required in order to utilize virtualization software?​

Select one of the following:

  • ​AMD-VT

  • ​Intel VirtualBit

  • Virtual Machine Extensions (VMX)

  • ​Virtual Hardware Extensions (VHX)

Explanation

Question 71 of 125

1

Select the file below that is used in VirtualBox to create a virtual machine:​

Select one of the following:

  • ​.vdi

  • .vbox

  • .r0

  • .ova

Explanation

Question 72 of 125

1

The __________________ is the version of Pcap available for Linux based operating systems.​

Select one of the following:

  • ​Winpcap

  • Libpcap

  • ​Tcpcap

  • ​Netcap

Explanation

Question 73 of 125

1

What utility is best suited to examine e-mail headers or chat logs, or network communication between worms and viruses?​

Select one of the following:

  • ​tcpdump

  • Argus

  • Ngrep

  • Tcpslice

Explanation

Question 74 of 125

1

At what layers of the OSI model do most packet analyzers function?​

Select one of the following:

  • Layer 1 or 2

  • ​Layer 2 or 3

  • ​Layer 3 or 4

  • ​Layer 4 or 5

Explanation

Question 75 of 125

1

In a __________ attack, the attacker keeps asking your server to establish a connection, with the intent of overloading a server with established connections.​

Select one of the following:

  • smurf​

  • ​SYN flood

  • spoof

  • ​ghost

Explanation

Question 76 of 125

1

​The DomainKeys Identified Mail service is a way to verify the names of domains a message is flowing through and was developed as a way to cut down on spam.

Select one of the following:

  • True
  • False

Explanation

Question 77 of 125

1

The Pagefile.sys file on a computer can contain message fragments from instant messaging applications.​

Select one of the following:

  • True
  • False

Explanation

Question 78 of 125

1

In an e-mail address, everything before the @ symbol represents the domain name.​

Select one of the following:

  • True
  • False

Explanation

Question 79 of 125

1

Committing crimes with e-mail is uncommon, and investigators are not generally tasked with linking suspects to e-mail.​

Select one of the following:

  • True
  • False

Explanation

Question 80 of 125

1

An Internet e-mail server is generally part of a local network, and is maintained and managed by an administrator for internal use by a specific company.​

Select one of the following:

  • True
  • False

Explanation

Question 81 of 125

1

What command below could be used on a UNIX system to help locate log directories?​

Select one of the following:

  • show log

  • ​detail

  • search

  • find​

Explanation

Question 82 of 125

1

The _______________ utility can be used to repair .ost and .pst files, and is included with Microsoft Outlook.​

Select one of the following:

  • fixmail.exe

  • ​scanpst.exe

  • ​repairpst.exe

  • ​rebuildpst.exe

Explanation

Question 83 of 125

1

E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​

Select one of the following:

  • ​log recycling

  • circular logging

  • log purging

  • ​log cycling

Explanation

Question 84 of 125

1

Syslog is generally configured to put all e-mail related log information into what file?​

Select one of the following:

  • /usr/log/mail.log

  • ​/var/log/messages

  • /proc/mail

  • /var/log/maillog

Explanation

Question 85 of 125

1

What kind of files are created by Exchange while converting binary data to readable text in order to prevent loss of data?​

Select one of the following:

  • .txt

  • .tmp

  • ​.exe

  • .log

Explanation

Question 86 of 125

1

On a UNIX system​, where is a user's mail stored by default?

Select one of the following:

  • ​/var/mail

  • ​/var/log/mail

  • ​/username/mail

  • ​/home/username/mail

Explanation

Question 87 of 125

1

Where does the Postfix UNIX mail server store e-mail?​

Select one of the following:

  • ​/home/username/mail

  • ​/var/mail/postfix

  • /var/spool/postfix

  • ​/etc/postfix

Explanation

Question 88 of 125

1

One of the most noteworthy e-mail scams was 419, otherwise known as the _______________.​

Select one of the following:

  • ​Nigerian Scam

  • ​Lake Venture Scam

  • Conficker virus

  • Iloveyou Scam

Explanation

Question 89 of 125

1

What information is not typically included in an e-mail header?​

Select one of the following:

  • ​The sender's physical location

  • ​The originating IP address

  • ​The unique ID of the e-mail

  • ​The originating domain

Explanation

Question 90 of 125

1

​In older versions of exchange, what type of file was responsible for messages formatted with Messaging Application Programming Interface, and served as the database file?

Select one of the following:

  • ​.ost

  • .edp

  • ​.edb

  • ​.edi

Explanation

Question 91 of 125

1

What type of Facebook profile is usually only given to law enforcement with a warrant?​

Select one of the following:

  • ​private profile

  • ​advanced profile

  • basic profile

  • ​Neoprint profile

Explanation

Question 92 of 125

1

Which option below is the correct path to the sendmail configuration file?​

Select one of the following:

  • /var/etc/sendmail.cf

  • ​/var/mail/sendmail.cf

  • ​/usr/local/sendmail.cf

  • /etc/mail/sendmail.cf

Explanation

Question 93 of 125

1

​In what state is sending unsolicited e-mail illegal?

Select one of the following:

  • Florida

  • Washington

  • ​Maine

  • New York

Explanation

Question 94 of 125

1

What service below can be used to map an IP address to a domain name, and then find the domain name's ​point of contact?

Select one of the following:

  • ​iNet

  • ARIN

  • Google

  • ​ERIN

Explanation

Question 95 of 125

1

Which e-mail recovery program below can recover files from VMware and VirtualPC virtual machines, as well as ISOs and other types of file backups?

Select one of the following:

  • ​Fookes Aid4mail

  • DataNumen Outlook Repair

  • ​EnCase Forensics

  • AccessData FTK​

Explanation

Question 96 of 125

1

Exchange uses an Exchange database and is based on the _______________________, which uses several files in different combinations to provide e-mail service.​

Select one of the following:

  • Microsoft Mail Storage Engine (MSE)

  • Microsoft Stored Mail Extensions (SME)

  • ​Microsoft Extended Mail Storage (EMS)

  • ​Microsoft Extensible Storage Engine (ESE)

Explanation

Question 97 of 125

1

The Suni Munshani v. Signal Lake Venture Fund II, LP et al case is an example of a case that involves e-mail ____________.​

Select one of the following:

  • destruction

  • ​spamming

  • ​spoofing

  • ​theft

Explanation

Question 98 of 125

1

In order to retrieve logs from exchange, the PowerShell cmdlet _______________________ can be used.​

Select one of the following:

  • ​GetExchangeLogs.ps1

  • GetLogInfo.ps1

  • ShowExchangeHistory.ps1

  • ​GetTransactionLogStats.ps1

Explanation

Question 99 of 125

1

​Select the program below that can be used to analyze mail from Outlook, Thunderbird, and Eudora.

Select one of the following:

  • AccessData FTK

  • ​DataNumen

  • R-Tools R-Mail

  • ​Fookes Aid4Mail

Explanation

Question 100 of 125

1

Which service below does not put log information into /var/log/maillog?​

Select one of the following:

  • SMTP

  • ​Exchange

  • ​IMAP

  • ​POP

Explanation

Question 101 of 125

1

What frequencies can be used by GSM with the TDMA technique?​

Select one of the following:

  • ​1200 to 1500 MHz

  • ​2.4 GHz to 5.0 GHz

  • 600 to 1000 MHz

  • ​800 to 1000 MHz

Explanation

Question 102 of 125

1

What digital network technology is a digital version of the original analog standard for cell phones?

Select one of the following:

  • GSM

  • CDMA

  • ​iDEN

  • D-AMPS

Explanation

Question 103 of 125

1

The _______________ component is made up of radio transceiver equipment that defines cells and communicates with mobile phones; sometimes referred to as a "cell phone tower".​

Select one of the following:

  • Base station controller (BSC)

  • Mobile switching center (MSC)

  • Base transceiver controller (BTC)

  • Base transceiver station (BTS)

Explanation

Question 104 of 125

1

What organization is responsible for the creation of the requirements for carriers to be considered 4G?

Select one of the following:

  • ​IEEE

  • ​ITU-R

  • ​ISO

  • TIA

Explanation

Question 105 of 125

1

Nonvolatile memory on a mobile device can contain OS files and stored user data, such as a __________________ and backed-up files.

Select one of the following:

  • Professional Data Holder

  • Personal Assistant Organizer

  • Personal Data Manager

  • ​Personal Information Manager

Explanation

Question 106 of 125

1

​The ___________________ technology is designed for GSM and Universal Mobile Telecommunications Systems (UMTS) technology, supports 45 Mbps to 144 Mbps transmission speeds.

Select one of the following:

  • WiMAX

  • ​LTE

  • ​MIMO

  • ​UMB

Explanation

Question 107 of 125

1

Which of the NIST guidelines below requires using a modified boot loader to access RAM for analysis?​

Select one of the following:

  • ​Chip-off

  • ​Manual extraction

  • ​Hex dumping

  • ​Micro read

Explanation

Question 108 of 125

1

GSM refers to mobile phones as "mobile stations" and divides a station into two parts, the __________ and the mobile equipment (ME).​

Select one of the following:

  • ​antenna

  • ​SIM card

  • radio

  • ​transceiver

Explanation

Question 109 of 125

1

​What digital network technology was developed during World War II?

Select one of the following:

  • TDMA

  • ​CDMA

  • ​GSM

  • ​iDEN

Explanation

Question 110 of 125

1

What type of mobile forensics method listed by NIST guidelines involves looking at a device's content page by page and taking pictures?

Select one of the following:

  • Manual extraction

  • Chip-off

  • ​Micro read

  • ​Logical extraction

Explanation

Question 111 of 125

1

​What method below is not an effective method for isolating a mobile device from receiving signals?

Select one of the following:

  • ​placing the device into a plastic evidence bag

  • ​placing the device into a paint can, preferably one previously containing radio-wave blocking paint

  • placing the device into airplane mode

  • ​turning the device off

Explanation

Question 112 of 125

1

​Select below the option that is not a typical feature of smartphones on the market today:

Select one of the following:

  • Microprocessor

  • ​Flash

  • ​ROM

  • ​Hard drive

Explanation

Question 113 of 125

1

What standard introduced sleep mode to enhance battery life, and is used with TDMA?​

Select one of the following:

  • ​IS-99

  • IS-140

  • IS-136

  • ​IS-95

Explanation

Question 114 of 125

1

Within NIST guidelines for mobile forensics methods, the ______________ method requires physically removing flash memory chips and gathering information at the binary level.​

Select one of the following:

  • Chip-off

  • ​Logical extraction

  • Micro read

  • ​Manual extraction

Explanation

Question 115 of 125

1

​On what mobile device platform does Facebook use a SQLite database containing friends, their ID numbers, and phone numbers as well as files that tracked all uploads, including pictures?

Select one of the following:

  • ​Android

  • ​Blackberry

  • ​Windows RT

  • ​iPhone

Explanation

Question 116 of 125

1

​Where is the OS stored on a smartphone?

Select one of the following:

  • RAM

  • ​Microprocessor

  • ​ROM

  • ​Read/write flash

Explanation

Question 117 of 125

1

The ________________ technology uses the IEEE 802.16e standard and Orthogonal Frequency Division Multiple Access (OFDMA) and supports transmission speeds of 12 Mbps​

Select one of the following:

  • WiMAX

  • ​CDMA

  • UMB

  • ​MIMO

Explanation

Question 118 of 125

1

Which of the following is not a type of peripheral memory card used in PDAs?​

Select one of the following:

  • Secure Digital (SD)

  • Compact Flash (CF)

  • ​MultiMediaCard (MMC)

  • ​RamBus (RB)

Explanation

Question 119 of 125

1

Which component of cell communication is used to route digital packets for the network and relies on a database to support subscribers?​

Select one of the following:

  • Base station controller (BSC)

  • Base transciever station (BTS)

  • ​Base transciever controller (BTC)

  • ​Mobile switching center (MSC)

Explanation

Question 120 of 125

1

Most Code Division Multiple Access (CDMA) networks conform to ____________ , created by the Telecommunications Industry Association (TIA).

Select one of the following:

  • ​TS-95

  • ​802.11

  • IS-95

  • ​IS-136

Explanation

Question 121 of 125

1

The use of smart phones for illicit activities is becoming more prevalent.​

Select one of the following:

  • True
  • False

Explanation

Question 122 of 125

1

Because mobile phones are seized at the time of arrest, a search warrant is not necessary to examine the device for information.​

Select one of the following:

  • True
  • False

Explanation

Question 123 of 125

1

Most Code Division Multiple Access networks conform to IS-95. The systems are referred to as CDMAOne, and when they went to 3G service, they became CDMAThree.​

Select one of the following:

  • True
  • False

Explanation

Question 124 of 125

1

While travelling internationally with a GSM phone, you can pop in a SIM card for the country you're currently in, rather than get a new phone.

Select one of the following:

  • True
  • False

Explanation

Question 125 of 125

1

Search and seizure procedures for mobile devices are as important as procedures for computers.​

Select one of the following:

  • True
  • False

Explanation