Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Advanced Smartphone Forensics Question and Answers

GIAC Advanced Smartphone Forensics

Last Update May 18, 2024
Total Questions : 75

We are offering FREE GASF GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GASF free exam questions and then go for complete pool of GIAC Advanced Smartphone Forensics test questions that will help you more.

GASF pdf

GASF PDF

$35  $99.99
GASF Engine

GASF Testing Engine

$42  $119.99
GASF PDF + Engine

GASF PDF + Testing Engine

$56  $159.99
Questions 1

Cellebrite Physical Analyzer uses Bit Defender to scan for malware by flagging files who have known bad hash values. This is an example of which type of mobile malware detection?

Options:

A.  

Specific-based malware detection

B.  

Signature-based detection

C.  

Behavioral-based detection

D.  

Cloud based malware detection

Discussion 0
Questions 2

Which artifact(s) can be extracted from a logical image only if the device the image was acquired from was jailbroken?

Options:

A.  

SMS/MMS

B.  

Email

C.  

Call Logs

D.  

Photos

Discussion 0
Questions 3

An Android device user is known to use Facebook to communicate with other parties under examination.

There is no evidence of the Facebook application on the phone. If there was Facebook usage where would an examiner expect to find these artifacts?

Options:

A.  

com.android.chrome/app_chrome/Default/Local Storage

B.  

dmappmgr.db

C.  

/data/system/packages.xml

D.  

AndroidManifest.xml

Discussion 0
Questions 4

As part of your analysis of a legacy BlackBerry device, you examine the installed applications list and it

appears that no third-party applications were installed on the device. Which other file may provide you with additional information on applications that were accessed with the handset?

Options:

A.  

BlackBerry NV Items

B.  

Content Store

C.  

Event logs

D.  

BBThumbs.dat

Discussion 0
Questions 5

When examining a file system acquisition of an Android device Which artifact must be carved out manually?

Options:

A.  

Deleted images

B.  

Contacts

C.  

SMS messages

D.  

Phone numbers

Discussion 0
Questions 6

An analyst investigating a Nokia S60 Symbian device wants to know if an Adobe Flash file on the handset is compromised.

Which file in the image will best target the Adobe Flash files?

Options:

A.  

FLASHLITE.sis

B.  

flashliteplugin.r03

C.  

saflash.r01

D.  

OnlinePrint.sis

Discussion 0
Questions 7

Property list (Plist) files are used by iOS devices to store datA. Which of the file formats below is common to

plist files?

Options:

A.  

HTML

B.  

SQL

C.  

DMG

D.  

Binary

Discussion 0
Questions 8

What is often more of a challenge with mobile forensics than other areas of forensics?

Options:

A.  

Analysis and Reporting of Information

B.  

Isolation of devices

C.  

Identification of evidence

D.  

Evidence collection

Discussion 0
Questions 9

During the forensic analysis of a Nokia Symbian phone, you receive a SD card with files in the Nokia\Content

Copier folder. What data is present to examine?

Options:

A.  

Encryption keys

B.  

User created images

C.  

Logon credentials

D.  

Backup files

Discussion 0
Questions 10

Which of the following is of most concern when attempting to root an Android device such as Google Glass

when conducting a forensic acquisition?

Options:

A.  

Rooting this device will overwrite the data partition

B.  

The manufacturer warranty is voided

C.  

Device security is altered

D.  

Traces of the root are left behind

Discussion 0
Questions 11

Where would an examiner find evidence of an iOS update to device from one version to another?

Options:

A.  

NOR memory

B.  

System partition

C.  

Data partition

D.  

SIM card

Discussion 0