0% found this document useful (0 votes)
5 views3 pages

MCQ

The document outlines key concepts in mobile forensics, including types of data collected (GPS, call logs, photos), the purpose of tools like Faraday bags and XRY Field, and procedures for handling mobile devices at crime scenes. It emphasizes the importance of securing devices to prevent data tampering and highlights various forensic tools used for data extraction and analysis. Additionally, it mentions the use of AI in recovering deleted footage and enhancing images for forensic investigations.

Uploaded by

ashwanis10112000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

MCQ

The document outlines key concepts in mobile forensics, including types of data collected (GPS, call logs, photos), the purpose of tools like Faraday bags and XRY Field, and procedures for handling mobile devices at crime scenes. It emphasizes the importance of securing devices to prevent data tampering and highlights various forensic tools used for data extraction and analysis. Additionally, it mentions the use of AI in recovering deleted footage and enhancing images for forensic investigations.

Uploaded by

ashwanis10112000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Which type of data is typically collected in mobile forensics?

A. GPS data
B. Call logs and messages
C. Photos and videos
D. All of the above

Answer: D

What is the purpose of a Faraday bag in mobile forensics?

A. To clean the phone's memory


B. To charge the device
C. To block network signals and prevent remote access
D. To increase data transfer speed

Answer: C

What is the primary function of XRY Field?


A. Network tracking
B. In-field data acquisition from mobile devices
C. Malware scanning
D. Wi-Fi jamming
Answer: B

XRY Cloud is used to extract data from:


A. Lost USB devices
B. Hard drives
C. Cloud services like WhatsApp, iCloud, etc.
D. SIM cards only
Answer: C

Which setting must be enabled for wireless debugging in Android?


A. Battery saver
B. VPN
C. Developer mode
D. Bluetooth tethering
Answer: C
What should a forensic expert do first at a mobile-related crime scene (Android)?
A. Delete all data
B. Turn on Bluetooth
C. Get the password, turn on airplane mode, disable Wi-Fi and Bluetooth
D. Start calling people
Answer: C

What should be done when handling an iPhone at a crime scene?


A. Turn on Airplane Mode
B. Remove the SIM card
C. Get the password and reset Face ID
D. Jailbreak the phone
Answer: C

XAMN is primarily used for:


A. Deleting user data
B. Device rooting
C. Analyzing and reporting mobile forensic data
D. Encrypting mobile files
Answer: C

Which of the following is NOT a type of mobile forensic evidence?


A. Chat messages
B. Call history
C. GPS logs
D. Desktop hard drive data
Answer: D

Which mobile forensic tool is used in the field for quick extraction?
A. FTK Imager
B. EnCase
C. XRY Field
D. Autopsy
Answer: C

Why is it important to turn on airplane mode during initial handling?


A. To save battery
B. To reduce heat
C. To prevent remote wiping or tampering
D. To unlock the phone
Answer: C
XRY Cloud requires credentials to access:
A. Mobile processors
B. Social media/cloud accounts
C. SIM cards
D. App update servers
Answer: B

Which tool is used for enhancing images in forensic investigations?


A. PhotoShop
B. GIMP
C. Amped FIVE
D. VLC
Answer: C

Amped Authenticate is used for detecting:


A. Sound distortion
B. Morphed or manipulated images
C. IP addresses
D. Encryption
Answer: B

Which tool is used to recover deleted CCTV footage using AI?


A. Amped Replay
B. MD Video with AI
C. WireShark
D. XRY
Answer: B

MD Video with AI uses artificial intelligence to:


A. Create fake videos
B. Recover and highlight specific objects or actions in footage
C. Encrypt video streams
D. Stream video online
Answer: B

You might also like