Q1. What is the best option to isolate a mobile device before acquisition?
Q2. What is the most comprehensive acquisition method?
Q3. What is the code that internationally and univocally identifies each SIM card called?
Q4. How many PUK attempts can we make before the SIM card becomes completely inaccessible?