What are examples of larceny theft?

What are examples of larceny theft?



Answer: Theft from a motor vehicle, shoplifting, pocket picking, and theft of bicycles.

Why do robbers take cell phones?

Why do robbers take cell phones?



Answer: To prevent the victim from calling the police, To hurt the victim by taking the most meaningful possession they own, To identify the victim so that they can attack the same person again, and it has monetary value

What method below is NOT an effective method for isolating a mobile device from receiving signals

What method below is NOT an effective method for isolating a mobile device from receiving signals




a. placing the device into a plastic evidence bag
b. placing the device into a paint can, preferable one previously containing radio-wave blocking paint
c. placing the device into airplane mode
d. turning the device off


Answer: a. placing the device into a plastic evidence bag

The _______ component is made up of radio transceiver equipment that defines cells and communicates with mobile phones; sometimes referred to as a "cell phone tower".

The _______ component is made up of radio transceiver equipment that defines cells and communicates with mobile phones; sometimes referred to as a "cell phone tower".




a. Vase station controller (BSC)
b. Mobile switching center (MSC)
c. Base transceiver controller (BTC)
d. Base transceiver station (BTS)


Answer: d. Base transceiver station (BTS)

Remote wiping of a mobile device can result in which of the following (Choose all that apply)

Remote wiping of a mobile device can result in which of the following (Choose all that apply)




a. Removing account information
b. Enabling GPS beacon to track the thief
c. Returning the phone to the original factory settings
d. Deleting contacts


Answer:

a. Removing account information
c. Returning the phone to the original factory settings
d. Deleting contacts

The term TDMA refers to which of the following (Choose all that apply)

The term TDMA refers to which of the following (Choose all that apply)




a. A technique of dividing a radio frequent so that multiple users share the same channel
b. A proprietary protocol developed by Motorola
c. A specific cellular network standard
d. A technique of spreading the signal across many channels
a. A technique of dividing a radio frequent so that multiple users share the same channel


Answer: c. A specific cellular network standard.

Exchange uses and Exchange database and is based on the , which uses several files in different combinations to provide e-mail service

Exchange uses and Exchange database and is based on the , which uses several files in different combinations to provide e-mail service



a. Microsoft Mail Storage Engine (MSE)
b. Microsoft Stored Mail Extension (SME)
c. Microsoft Extended Mail Storage (EMS)
d. Microsoft Extensible Storage Engine (ESE)


Answer: d. Microsoft Extensible Storage Engine (ESE)

What information is not typically included in an e-mail header

What information is not typically included in an e-mail header



a. the sender's physical location
b. the originating IP address
c. the unique ID of the e-mail
d. the originating domain


Answer: a. the sender's physical location