Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CITP Exam 4 Questions with Complete Solutions

Beoordeling
-
Verkocht
-
Pagina's
17
Cijfer
A+
Geüpload op
14-03-2026
Geschreven in
2025/2026

CITP Exam 4 Questions with Complete Solutions

Instelling
CITP
Vak
CITP

Voorbeeld van de inhoud

CITP Exam 4 Questions with Complete
Solutions17

INTRODUCTION TO MOBILE DEVICE INVESTIGATIONS

EPO #1: Determine types of technology and the unique identifiers associated with a mobile
device. - ANSWERS-· IMEI - International mobile equipment ID. Perm 15-17 digit #. Is a
permanent number.

· CDMA - MEID = Mobile Equipment ID. Can lookup make/model

· SIM - Subscriber Identity Module. Authentication of device to cell network. ICCID is the serial
number for your SIM card.

· MSISDN - Mobile Directory Number AND MIN - Mobile ID Number is another name for a
phone number

· The Call Detail Records (CDR) needs to know what tower the cellphone is connected to.
Provides list of calls or other types of transmissions



INTRODUCTION TO MOBILE DEVICE INVESTIGATIONS

EPO #2: Use forensic hardware and software tools to extract and analyze digital data from a
seized mobile device. - ANSWERS-· Different types of extractions include manual, logical, and
physical

o Manual: must take photographs of all screens

o Logical: usually using Cellebrite. Utilizes the built-in backup feature found in the device's
operating system (OS).

o Physical: Provides access to ALL data, basically a replica of the whole phone, usually requires
forensic software



FIRST RESPONDERS TO DIGITAL EVIDENCE

EPO #1: Define the uses and roles of electronic devices in criminal activity. - ANSWERS-· Three
Major Rolls

,o Computers as a target of an illegal scheme: system intrusion, hacking, DDOS attacks, or
ransomware to name a few.

o Computers used as the instrument or tool to facilitate criminal activity: ex solicitation of
minors, electronic stalking, credit card scams, tax or benefit fraud, ID theft

o Computers and other electronic devices as repositories of evidence and other information:
may contain photos, PII, or certain types of software



FIRST RESPONDERS TO DIGITAL EVIDENCE

EPO #2: Identify electronic devices that may be or may contain evidence. - ANSWERS-·
Permanent files as well as temporary internet files. Search terms from web browsers

· Phone SIM cards

· Removable media - optical CDs, DVDs, and Blu-Ray or external drives, flash memory cards, or
USB drives.

· Cloud computing can contain evidence and needs an additional warrant.



FIRST RESPONDERS TO DIGITAL EVIDENCE

EPO #3: Describe how electronic evidence may be altered or destroyed. - ANSWERS-· The "two
enemies" are physical or external damage and software or internal alteration.

· All media can be altered through brute force, extreme temps, water/ condensation, or fire.
Seize it anyway, the data may still be recoverable



FIRST RESPONDERS TO DIGITAL EVIDENCE

EPO #4: Identify non-electronic items that may be important in the investigation of an electronic
crime. - ANSWERS-· Hardware: may contain DNA evidence or bodily fluids

· Printed documents or reports

· Scraps of paper with codes or passwords

· Indicators of ownership like receipts, mail, manuals



FIRST RESPONDERS TO DIGITAL EVIDENCE

, EPO #5: Identify the proper procedures in collecting, preserving, and transporting computers
and electronic items seized as evidence. - ANSWERS-· Use Faraday bags or wrap in foil if none
are available.

· Secure crime scene both physically and electronically. Sever network connectivity. Unplug
desktop.

· Conduct electronics sweep.

· Leave phone how you found it, on or off. Isolate phones in Faraday bag.



FIRST RESPONDERS TO DIGITAL EVIDENCE

EPO #6: Identify the proper procedures for RAM Capture and uses for recovered data. -
ANSWERS-· Random Access Memory (RAM) - is the storage area of everything the computer
processes. Capture it especially if you cannot remove the actual device or cannot get the
password.

- enables investigators and examiners to do a full memory analysis and access data



ELECTRONIC SURVEILLANCE TECHNIQUES

EPO #1: Identify the various types of Electronic Surveillance Equipment, technologies, and their
characteristics used in investigations and operations. - ANSWERS-· Audio recordings: modern
devices are small, and battery operated. May be a cellphone app, key fob, or small hidden
device.

· Tracking devices: GPS or RF tracking devices make surveillance easier, but US vs. Jones 2012
determined that a search warrant is needed.

· Video surveillance: moving or video record systems, or CCTV (fixed systems) including "traffic
camera." Some are sensor activated. Can also track using WiFi enabled systems like PSP or
smart devices.



ELECTRONIC SURVEILLANCE TECHNIQUES

EPO #2: Identify considerations for using Electronic Surveillance Equipment as well as applicable
protocols to conduct technical operations or investigations. - ANSWERS-· RF/Beacon: good for
areas with no cellular coverage. Older system.

· GPS/Cellular

Geschreven voor

Instelling
CITP
Vak
CITP

Documentinformatie

Geüpload op
14 maart 2026
Aantal pagina's
17
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
wanjejer1900

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
wanjejer1900 Biology
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
1 jaar
Aantal volgers
0
Documenten
1269
Laatst verkocht
5 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen