Question 6 of 68
When conducting forensic analysis of an associated media card, one would most often expect to find this particular file system format?
    Correct Answer: D

Question 7 of 68
Cellebrite Physical Analyzer uses Bit Defender to scan for malware by flagging files who have known bad hash values. This is an example of which type of mobile malware detection?
    Correct Answer: B

Question 8 of 68
Which of the following is required in addition to the Apple ID of the custodian to access IOS backup files that are stored in ICloud?
    Correct Answer: B

Question 9 of 68
In 2015, Apples iTunes store was found to be hosting several malicious applications that were infected as a result of hacked version of the developer toolkit used to create applications. Which Apple developer suite was targeted?
    Correct Answer: A

Question 10 of 68
An Android device user is known to use Facebook to communicate with other parties under examination. There is no evidence of the Facebook application on the phone. If there was Facebook usage where would an examiner expect to find these artifacts?
    Correct Answer: B