Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

GASF GIAC Advanced Smartphone Forensics Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GASF GIAC Advanced Smartphone Forensics certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 75 questions

Which file, found natively on most Android devices, will contain location history such as coordinates, physical addresses and timestamps?

A.

/data/data/com.google.android.apps.maps/databases/da_destination_history

B.

/data/data/com.google.android.apps.maps/databases/search_history.db

C.

/data/data/com.google.android.location/files/DATA_Preferences

D.

/data/data/com.vznavigator.ADR6300/databases/NIMSTORE.db

Examine the file, Bluetooth, what is the name of the device being examined?

A.

CON

B.

WIN7

C.

CON….M

D.

WIN10

What information can you determine by reviewing the (bp2p) file from a BlackBerry OS10 handset?

A.

Cloud accounts

B.

Bluetooth pairings

C.

Paired computers

D.

Connected Wireless Access points

Which of the following chipsets is commonly found in knock-off handsets?

A.

Invidia Tegra

B.

MediaTek (MTK)

C.

A8

D.

Qualcomm Snapdragon

Where would an examiner find evidence of an iOS update to device from one version to another?

A.

NOR memory

B.

System partition

C.

Data partition

D.

SIM card

Cellebrite Physical Analyzer uses Bit Defender to scan for malware by flagging files who have known bad hash values. This is an example of which type of mobile malware detection?

A.

Specific-based malware detection

B.

Signature-based detection

C.

Behavioral-based detection

D.

Cloud based malware detection

What type of storage does an iOS device use for user data?

A.

SSD

B.

SIM

C.

NAND

D.

NOR

Exhibit:

Where can an analyst find data to provide additional artifacts to support the evidence in the highlighted file?

A.

internal.db-wal

B.

browser2.db

C.

sysmon2.db-shm

D.

external.db

What are the three components that make up the International Mobile Subscriber Identity (IMSI)?

A.

Mobile Station International Subscriber Directory Number (MSISDN), Mobile Network Code (MNC), Mobile

Station Identification Number (MSIN)

B.

Subscriber Identity Module (SIM), Mobile Station International Subscriber Directory Number (MSISDN),

Mobile Network Code (MNC)

C.

Mobile Country Code (MCC), Mobile Network Code (MNC), Mobile Station Identification Number (MSIN)

D.

Mobile Country Code (MCC), Mobile Station International Subscriber Directory Number (MSISDN),

Integrated Circuit Card Identification (ICCID)

Which file, located on the Android file system, may be examined to correlate files related to external SD cards that were once used in an Android device?

A.

Internal.db

B.

Main.db

C.

DataManager. Db

D.

external.db

When examining a file system acquisition of an Android device Which artifact must be carved out manually?

A.

Deleted images

B.

Contacts

C.

SMS messages

D.

Phone numbers

You have conducted a keyword search over flash.bin and notice that multiple instances of the same data

appear many times throughout the flash image. What is this an example of?

A.

Flash Translation Layer (FTL)

B.

Logical Block Addressing (LBA)

C.

NAND degradation

D.

Wear-leveling

The jTAG method is designed to acquire data through which of the following?

A.

Chip-level access

B.

Twister box with RJ45 connection

C.

Test Access Ports (TAPs)

D.

Chip-level access USB connection

What is the essential piece of information is most often required in order to decrypt the contents of BlackBerry OS 10 handsets?

A.

BlackBerry Blend username/pin

B.

BlackBerry Balance username/password

C.

BlackBerry Link ID/password

D.

BBM pin

When examining the iOS device shown below the tool indicates that there are 4 chat messages recovered from the device.

Which of the following locations may contain additional chat information?

A.

Memory ranges from a physical dump of the device

B.

Databases installed and maintained by the application

C.

Internet history plist files found in logical acquisitions

D.

IP connections used by the application

While analysis in BlackBerry application list it appears that no third-party applications were installed on the device. Which other file may provide you with additional information on applications that were accessed with the handset?

A.

BlackBerry NV Items

B.

Content Store

C.

Event logs

D.

BBThumbs.dat

Which artifact must be carved out manually when examining a file system acquisition of an Android device?

A.

Deleted images

B.

Contacts

C.

SMS messages

D.

Phone numbers

Review the sample database.

What is the BLOB column storing for this particular database table?

A.

Mp4 videos

B.

Encrypted text messages

C.

Audio files

D.

Text messages

E.

JPEG images

Which of the following is of most concern when attempting to root an Android device such as Google Glass

when conducting a forensic acquisition?

A.

Rooting this device will overwrite the data partition

B.

The manufacturer warranty is voided

C.

Device security is altered

D.

Traces of the root are left behind

The files pictured below from a BlackBerry OS10 file system have a unique file extension.

What can be concluded about these files?

A.

Files are protected by the file system, so changing the file system makes them less accessible

B.

Files are encrypted to prevent them from being viewed without the decryption key

C.

Files are encoded for secure transmitting of data

D.

Files are located on a media card so they contain a unique file extension

Page: 1 / 2
Total 75 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved