SIM Forensic MCQ: Mobile Forensic MCQs Ex-1.5

SIM Forensic MCQs

31. Assertion: EF_SMS also stores a status flag.
Reason: It designated the read, sent, deleted, and unread status of each message.

  1. Both (A) and (R) are correct
  2. (A) is correct, but (R) is incorrect
  3. Both (A) and (R) are incorrect
  4. (A) is incorrect, but (R) is correct.

Answer & Explanation

Answer: (1) Both (A) and (R) are correct

Explanation:
This SIM Forensic MCQ Question doesn’t require any explanation.

32. After forensic extraction of hex value from EF_SMS, the word “from” number means

  1. Service center number
  2. Originating address
  3. Last call number
  4. All of the above

Answer & Explanation

Answer: (2) Originating address

Explanation:
The “form” number shows the Transmission Path-Originating Address.

33. Can a SIM card store multimedia messages?

  1. Yes
  2. No
  3. It depends on the size of SIM cards
  4. All GSM-based SIM can store MMS files.

Answer & Explanation

Answer: (2) No

Explanation:
No, any SIM till now, does not store multimedia information regarding MMS because of it has a very compact storing capability. But with the flagged status, it can show information such as sent or received.

34. How a SIM card can be protected by the user’s end?

  1. Using PIN
  2. Don’t share the OTP
  3. Don’t use shared features
  4. All of the above.

Answer & Explanation

Answer: (1) Using PIN

Explanation:
A SIM card can be protected using a Personal Identification Number (PIN). Besides this, a default PIN is assigned by the company when a user purchases the SIM card. Therefore, a SIM card has two PINs i.e. PIN1 and PIN2.

35. Once the SIM card is locked by many attempts of unauthorized access then the SIM card is only recovered using

  1. PIN1
  2. PIN2
  3. PUK
  4. Both (1) and (2)

Answer & Explanation

Answer: (3) PUK

Explanation:
PUK is used to unblock the locked SIM card which is blocked by numerous wrong PIN attempts. And the value of PUK is stored by wireless carriers.

36. What is the full form of PUK in SIM Forensic?

  1. Packed Unlocking Key
  2. Personal Unblocking Key
  3. Person Unblocking Key
  4. Personal Unlocking Key

Answer & Explanation

Answer: (3) Person Unblocking Key

Explanation:
In general, PUK stands for Person Unlocking Key or Person Unblocking Key.

37. What is the sole purpose of PIN1?

  1. SIM Security
  2. Store contacts
  3. Store SMS
  4. All of the above

Answer & Explanation

Answer: (1) SIM Security

Explanation:
PIN1 has only the purpose of SIM Security. By default, the SIM PIN value is 0000 or 1234, or sometimes the last four digits of the assigned SIM number.

38. What is the purpose of PIN2 of SIM?

  1. SIM Security
  2. Store contacts
  3. Store SMS
  4. All of the above

Answer & Explanation

Answer: (2) Store contacts

Explanation:
After unlocking PIN2, the forensic examiner can access the store information usually the phone-book area.

39. Assertion: An examiner should place a cloned SIM in the recovered phone.
Reason: It makes the phone to believe that the original SIM is being inserted back into the phone.

  1. Both (A) and (R) are correct
  2. (A) is correct, but (R) is incorrect
  3. Both (A) and (R) are incorrect
  4. (A) is incorrect, but (R) is correct.

Answer & Explanation

Answer: (4) (A) is incorrect, but (R) is correct

Explanation:
By doing so, the forensic examiner may make the recovered device unacceptable in the law of court. Furthermore, by doing so, it might change the original values on the target phone.

40. What are the two values that make a closed SIM appear as the original SIM for a mobile device?

  1. PIN & ICCID values
  2. ICCID & IMSI values
  3. IMSI & TMSI values
  4. TMSI & ICCID values

Answer & Explanation

Answer: (2) ICCID & IMSI values

Explanation:
ICCID and IMSI values are used to make a cloned SIM work as the original SIM. And both values are also used to generate the hash value.

41. The HASH value is used in Forensic SIM cloning to address the issue of

  1. Creating a new ICCID number
  2. Successful Cloning Criteria
  3. Validation of test SIM as a copy of the original SIM
  4. Both (2) and (3)

Answer & Explanation

Answer: (4) Both (2) and (3)

Explanation:
HASH value serves to major operations, first is the validation of an exact copy of the SIM i.e. bit by bit copy and also an indication of a successful cloning.

Jump to Previous MCQ Post: Cellular Network MCQs Part 2: Mobile Forensic MCQs Ex-1.4.2
Next Mobile Forensic MCQ Topic: Mobile Device Identification MCQs