Professional Documents
Culture Documents
Tutorial 9
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
2. Typically, phones store system data in EEPROM, which enables service providers to
reprogram phones without having to physically access memory chips.
3. Sim Cards are usually found in GSM devices and consist of a microprocessor and
internal memory.
4. Which of the three cloud service levels allows customers to rent hardware and install
whatever OSs and applications they need?
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH
2. The chip-off mobile forensics method requires physically removing the flash memory
chip and gathering information at the binary level.
3. A new field is Vehicle system forensics, which addresses the many parts that have
sensors in cars.
4. Encrypted data in the cloud is in two states. Which state is used to describe data that is
being transmitted over a network?
Data in motion
Questions and Projects are prepared from Cengage Learning Resource ‘Guide to Computer Forensics and Investigations’. Nelson, B, Phillips, A. &
Steuart, C 2018, Sixth Edition, Cengage Learning US. Mason. OH