Based on the image below, which file system is being examined?
AChinese knock-off
BWindows
CAndroid
DBlackberry
Following the introduction of iMessage with the firmware release iOS 5, devices began storing date/timestamps in which of the following formats?
AUNIXEPOCH
BPDU SMS timestamp
CUNIXEPCH
DMac epoch
The device pictured below is in Download Mode to attempt a physical acquisition. What can be ascertained by viewing the Android boot screen below?
AThe Android is not rooted
BNo ROM changes have ever occurred on this device
CThe Original/Factory ROM is booting
DThe Original ROM was at one time modified
An analyst investigating a Nokia S60 Symbian device wants to know if an Adobe Flash file on the handset is compromised. Which file in the image will best target the Adobe Flash files?
AFLASHLITE.sis
Bflashliteplugin.r03
Csaflash.r01
DOnlinePrint.sis
Question 6
Mobile Device File System Artifacts
0
Question 7
Mobile Device File System Artifacts
Question 8
Mobile Device Malware Analysis
Question 9
Apple Device File System Artifacts
Question 10
Mobile Device Malware Analysis
Question 11
Android Device File System Artifacts
Question 12
Introduction to Mobile Forensics
Question 13
Mobile Device File System Artifacts
Question 14
Android Device File System Artifacts
Question 15
Introduction to Mobile Forensics
Question 16
Mobile Device File System Artifacts
Question 17
Mobile Device Malware Analysis
Question 18
Apple Device File System Artifacts
Question 19
Introduction to Mobile Forensics
Question 20
Introduction to Mobile Forensics
Question 21
Android Device Application Analysis
Question 22
Apple Device File System Artifacts
Question 23
Introduction to Mobile Forensics
Question 24
Apple Device File System Artifacts
Question 25
Introduction to Mobile Forensics
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
As part of your analysis of a legacy BlackBerry device, you examine the installed applications list and it appears that no third-party applications were installed on the device. Which other file may provide you with additional information on applications that were accessed with the handset?
ABlackBerry NV Items
BContent Store
CEvent logs
DBBThumbs.dat
When conducting forensic analysis of an associated media card, one would most often expect to find this particular file system format?
AHFS
BNTFS
CYaffs2
DFAT
Cellebrite Physical Analyzer uses Bit Defender to scan for malware by flagging files who have known bad hash values. This is an example of which type of mobile malware detection?
ASpecific-based malware detection
BSignature-based detection
CBehavioral-based detection
DCloud based malware detection
Which of the following is required in addition to the Apple ID of the custodian to access IOS backup files that are stored in ICloud?
AiTunes password
BDevice passcode
CManifest.plist
DKeychain-backup.plist
In 2015, Apples iTunes store was found to be hosting several malicious applications that were infected as a result of hacked version of the developer toolkit used to create applications. Which Apple developer suite was targeted?
AXcode
BADB
CMomentics IDE
DXamarin
An Android device user is known to use Facebook to communicate with other parties under examination. There is no evidence of the Facebook application on the phone. If there was Facebook usage where would an examiner expect to find these artifacts?
Physical Analyzer provides a function to narrow down a search based on a timestamp, a type, a party or date. What is the name of this advanced searching capability?
AWatchlist Editor
BTags
CTimeline
DEvent of Interest
The files pictured below from a BlackBerry OS10 file system have a unique file extension. What can be concluded about these files?
AFiles are protected by the file system, so changing the file system makes them less accessible
BFiles are encrypted to prevent them from being viewed without the decryption key
CFiles are encoded for secure transmitting of data
DFiles are located on a media card so they contain a unique file extension
Where can an analyst find data to provide additional artifacts to support the evidence in the highlighted file?
Ainternal.db-wal
Bbrowser2.db
Csysmon2.db-shm
Dexternal.db
Which of the following is a unique 56 bit number assigned to a CDMA handset?
AMobile Station International Subscriber Directory Number (MSISDN)
BElectronic Serial Number (ESN)
CInternational Mobile Equipment Identifier (IMEI)
DMobile Equipment ID (MEID)
Which of the following files provides the most accurate reflection of the device’s date/timestamp related to the last device wipe?
Which of the following is the term for the SMS malware that sends text messages to a premium number generating large service bills for the user of the targeted device?
ATrojan
BAdware
CPotentially unwanted applications
DClick bait
When examining the iOS device shown below the tool indicates that there are 4 chat messages recovered from the device. Which of the following locations may contain additional chat information?
AMemory ranges from a physical dump of the device
BDatabases installed and maintained by the application
CInternet history plist files found in logical acquisitions
DIP connections used by the application
Which of the following can most forensics tools crack on an iOS device?
ATouch (fingerprint) ID
BSimple passcode
CPassphrase
Which cloud based system can be utilized by Android owners to backup user data?
AAmazon Web Services (AWS)
BSamsung Kies
CAndroid Device Manager
DGoogle
Analyze the two tables (Albums and Photos) provided from the Facebook database on an Android device located at the path: /data/data/com.facebook.katana/ databases/fb.db.
Which photo was added to Facebook by the user of the device?
A106716779501997_1073741827
B100003042564055_1073741835
C100005241790123_1073741832
D100006274086300_1073741835
Which file will indicate if Siri was active on an iOS device?