The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when you extract data. Devices are in the __________ state when received from the manufacturer. A quiescent B active C nascent D semi-active {Ans: C}Use of __________ tools enables an investigator to reconstruct file fragments if files have been deleted or overwritten. A forensic toolkit B bit-level C general principles D software {Ans: B}Before you can do any forensic analysis or examination, you have to do what? A present evidence in one form or another to a scrutinizing body B collect the evidence C compile the Expert Report D be able to solve puzzles {Ans: B}Which of the following is the definition of hash? A analysis involving using the native operating system, on the evidence disk or a forensic duplicate, to peruse the data B software that cleans unallocated space C the art and science of writing hidden messages D a function that is nonreversible, takes variable-length input, produces fixed-length output, and has few or no collisions {Ans: D}The __________ contains many provisions about recordkeeping and destruction of electronic records relating to the management and operation of