Networking Chapter 12 Describe The Two Different Types Memory Typically

subject Type Homework Help
subject Pages 9
subject Words 2404
subject Authors Amelia Phillips, Bill Nelson, Christopher Steuart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Name:
Class:
Date:
Indicate whether the statement is true or false.
1. While travelling internationally with a GSM phone, you can pop in a SIM card for the country you're currently in,
rather than get a new phone.
a.
True
b.
False
2. Most Code Division Multiple Access networks conform to IS-95. The systems are referred to as CDMAOne, and when
they went to 3G service, they became CDMAThree.
a.
True
b.
False
3. Search and seizure procedures for mobile devices are as important as procedures for computers.
a.
True
b.
False
4. Because mobile phones are seized at the time of arrest, a search warrant is not necessary to examine the device for
information.
a.
True
b.
False
5. The use of smart phones for illicit activities is becoming more prevalent.
a.
True
b.
False
Indicate the answer choice that best completes the statement or answers the question.
6. Which component of cell communication is used to route digital packets for the network and relies on a database to
support subscribers?
a.
Base transciever station (BTS)
b.
Base station controller (BSC)
c.
Base transciever controller (BTC)
d.
Mobile switching center (MSC)
7. The ________________ technology uses the IEEE 802.16e standard and Orthogonal Frequency Division Multiple
Access (OFDMA) and supports transmission speeds of 12 Mbps
a.
UMB
b.
WiMAX
c.
MIMO
d.
CDMA
8. What digital network technology was developed during World War II?
a.
GSM
b.
TDMA
c.
iDEN
d.
CDMA
page-pf2
Name:
Class:
Date:
9. Where is the OS stored on a smartphone?
a.
RAM
b.
ROM
c.
Microprocessor
d.
Read/write flash
10. Which of the following is not a type of peripheral memory card used in PDAs?
a.
Compact Flash (CF)
b.
MultiMediaCard (MMC)
c.
Secure Digital (SD)
d.
RamBus (RB)
11. Most Code Division Multiple Access (CDMA) networks conform to ____________ , created by the
Telecommunications Industry Association (TIA).
a.
TS-95
b.
802.11
c.
IS-95
d.
IS-136
12. Select below the option that is not a typical feature of smartphones on the market today:
a.
Microprocessor
b.
ROM
c.
Hard drive
d.
Flash
13. Nonvolatile memory on a mobile device can contain OS files and stored user data, such as a __________________
and backed-up files.
a.
Personal Data Manager
b.
Personal Assistant Organizer
c.
Personal Information Manager
d.
Professional Data Holder
14. What frequencies can be used by GSM with the TDMA technique?
a.
800 to 1000 MHz
b.
600 to 1000 MHz
c.
1200 to 1500 MHz
d.
2.4 GHz to 5.0 GHz
15. What organization is responsible for the creation of the requirements for carriers to be considered 4G?
a.
IEEE
b.
ISO
c.
ITU-R
d.
TIA
page-pf3
Name:
Class:
Date:
16. GSM refers to mobile phones as "mobile stations" and divides a station into two parts, the __________ and the mobile
equipment (ME).
a.
SIM card
b.
radio
c.
transceiver
d.
antenna
17. What type of mobile forensics method listed by NIST guidelines involves looking at a device's content page by page
and taking pictures?
a.
Manual extraction
b.
Logical extraction
c.
Chip-off
d.
Micro read
18. What method below is not an effective method for isolating a mobile device from receiving signals?
a.
placing the device into airplane mode
b.
placing the device into a paint can, preferably one previously containing radio-wave blocking paint
c.
turning the device off
d.
placing the device into a plastic evidence bag
19. Within NIST guidelines for mobile forensics methods, the ______________ method requires physically removing
flash memory chips and gathering information at the binary level.
a.
Manual extraction
b.
Logical extraction
c.
Chip-off
d.
Micro read
20. On what mobile device platform does Facebook use a SQLite database containing friends, their ID numbers, and
phone numbers as well as files that tracked all uploads, including pictures?
a.
Android
b.
iPhone
c.
Blackberry
d.
Windows RT
21. The ___________________ technology is designed for GSM and Universal Mobile Telecommunications Systems
(UMTS) technology, supports 45 Mbps to 144 Mbps transmission speeds.
a.
MIMO
b.
LTE
c.
UMB
d.
WiMAX
22. What standard introduced sleep mode to enhance battery life, and is used with TDMA?
a.
IS-95
b.
IS-136
c.
IS-99
page-pf4
Name:
Class:
Date:
d.
IS-140
23. What digital network technology is a digital version of the original analog standard for cell phones?
a.
CDMA
b.
GSM
c.
iDEN
d.
D-AMPS
24. The _______________ component is made up of radio transceiver equipment that defines cells and communicates
with mobile phones; sometimes referred to as a "cell phone tower".
a.
Base transceiver station (BTS)
b.
Base station controller (BSC)
c.
Mobile switching center (MSC)
d.
Base transceiver controller (BTC)
25. Which of the NIST guidelines below requires using a modified boot loader to access RAM for analysis?
a.
Chip-off
b.
Micro read
c.
Hex dumping
d.
Manual extraction
Enter the appropriate word(s) to complete the statement.
26. For personal use, _____________________ have been mostly replaced by iPods, iPads, and other mobile devices.
27. ______________ introduced the fourth-generation (4G) network in 2009.
28. The ________________ tool can be used to view data on CDMA phones, such as those made by LG, Samsung,
Sanyo, and others. This utility is available on Windows, Linux, and Mac OS X, and although it is not considered a
forensic tool, it can be used in read-only mode.
29. The ___________________ digital network is a faster version of GSM, and is designed to deliver data.
30. The _______________ technology, developed by Airgo and acquired by Qualcomm, supports transmission speeds of
312 Mbps and is used by 4G WiMAX, and other technologies.
Match the following terms with the correct definition below:
a.
Code Division Multiple Access (CDMA)
b.
Electronically Erasable Programmable Ready-only Memory
(EEPROM)
c.
Fourth-generation (4G)
d.
Global System for Mobile Communication (GSM)
e.
Internal Telecommunication Union (ITU)
f.
Orthogonal Frequency Division Multiplexing (OFDM)
g.
Personal Digital Assistants (PDAs)
h.
Subscriber Identity Mudule (SIM) cards
i.
Telecommunication Industry Association
(TIA)
j.
Third-generation (3G)
page-pf5
Name:
Class:
Date:
31. The current generation of mobile phone standards, with technologies that improve speed and accuracy.
32. An international organization dedicated to creatung telecommunication standards.
33. The preceding generation of mobile phone standards technology; had more advanced features and faster data rates
than the older analog and personal communication services (PCS) technologies.
34. A widely used digital cell phone technology that makes use of spread-spectrum modulation to spread the signal across
a wide range of frequencies.
35. A 4G technology that uses numerous parallel carriers instead of a signle broad carrier and is less susceptible to
interference.
36. A second-generation cellular network standard; currently the most used cellular network in the world.
37. Removeable cards in GSM phones that contain information for identifying subscribers. They can also store other
information, such as messages and call history.
38. A type of nonvolatile memory that can be reprogrammed electronically, without having to physically access of remove
the chip.
39. A US trade association representing hundreds of telecommunication companies that work to establish and maintain
telecommunication standards.
40. Handheld electronic devices that typically contain personal productivity application used for calendaring, contact
management, and note taking. Unlike smart phones, PDAs don't have telephony capabilities/
41. Describe the file structure on a SIM card, and discuss what information can be retrieved from a SIM card.
42. List the six types of mobile forensics methods as defined by NIST guidelines, and describe each method.
43. List and briefly describe some of the technologies that can be used to create 4G networks.
44. Describe the two different types of memory typically used by mobile devices.
45. What difficulties might a forensics investigator face when attempting to check information with a service provider that
uses third party cloud services?
46. Describe three different types of peripheral memory cards that are commonly used with PDAs.
47. Explain why mobile phone forensics is a challenging task.
48. List and describe the three main components that are used for cell communication as defined by NIST SP 800-101.
49. What challenges are being posed by the Internet of Things (IoT)?
50. When discussing social media forensics on mobile devices, how do the various platforms differ?
page-pf6
Name:
Class:
Date:
page-pf7
Name:
Class:
Date:
page-pf8
Name:
Class:
Date:
page-pf9
Name:
Class:
Date:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.