Search Header Logo
Mobile Forensics - QUIZ

Mobile Forensics - QUIZ

Assessment

Presentation

Information Technology (IT)

University

Medium

Created by

Roshna Ravindran

Used 2+ times

FREE Resource

0 Slides • 12 Questions

1

Word Cloud

First information to decode from a mobile backup?

2

Drag and Drop

Caselet: A popular social media influencer reports her phone stolen after a club event. Two days later, suspicious posts appear on her account promoting a questionable cryptocurrency. The phone is recovered when police arrest a man for pickpocketing.

Question? The influencer claims she never made those posts. What specific type of mobile data would be MOST valuable to prove or disprove her claim?​ ​
Drag these tiles and drop them in the correct blank above
Application usage logs showing which app was activ
The phone's call history 
Google Maps location history during posts time
The phone's battery level at the time of the posts

3

Fill in the Blank

When a file is deleted from a mobile phone, the data isn't immediately erased but remains in the ________ space until overwritten.

4

Fill in the Blank

To verify that a forensic image hasn't been altered during analysis, examiners compare ________ values before and after examination.

5

Match

Match the Investigation Type to the Most Relevant Data Source

Stalking Case

Fraud Investigation

Intellectual Property Theft

Suicide Investigation

Location history and geotagged photos

Banking app data and transaction alerts

Email attachments and cloud storage sync

Keyboard cache and search history

6

Multiple Choice

An employee is suspected of leaking confidential company designs. Their corporate iPhone was seized. A logical extraction was performed, but no leaked files were found in the active storage.What should be the examiner's next step to find potential evidence?

1

Close the case, as the logical extraction found nothing.

2

Perform a physical extraction to search the unallocated space for deleted files.

3

Contact Apple to get the data from iCloud.

4

Return the phone to the employee.

7

Multiple Select

Which of the following are considered best practices when seizing a mobile device? (Select all that apply.)

1

Document the device's condition with photographs.

2

Place the device in a Faraday bag or enable Airplane mode.

3

Use a portable power bank to maintain the device's charge if it's on.

4

If the device is on, try to scroll through as much data as possible before it locks.

5

If the device is off, turn it on to confirm it's working.

8

Drag and Drop

You find a photo of a stolen item on a suspect's phone, taken yesterday. Which of the image file would be most crucial for placing the suspect at a specific location?​ ​ ​
Drag these tiles and drop them in the correct blank above
GPS coordinates in the EXIF data
The camera model
The image resolution
location database

9

Dropdown

In the "Mobile Image Analysis" section, geographic coordinates and movement history fall under which category?​ ​

10

Match

Match the following

Physical Acquisition

Logical Acquisition

JTAG Acquisition

File System Acquisition

Creates a complete memory image

Collects user-visible data

Connects to the circuit board

Copies the directory structure

11

Reorder

Reorder the following

Seizure & Isolation

Acquisition & Preservation

Analysis & Examination

Reporting & Presentation

1
2
3
4

12

Categorize

Options (4)

sms.db

calllog.db

contacts.db

accounts.db

Drag the following common database files to the category that best describes the information they typically contain.

Communications History
User Information

First information to decode from a mobile backup?

Show answer

Auto Play

Slide 1 / 12

WORD CLOUD