CH7 Email Forensics

¡Supera tus tareas y exámenes ahora con Quizwiz!

3. __________ involves making an email message appear to come from someone or someplace other than the real sender or location. A. Spoofing B. Stripping C. Extracting D. Transference

A. Spoofing

9. __________ was the first law meant to curtail unsolicited email. However, the law has many loopholes. A. The CAN-SPAM Act B. 18 U.S.C. 2252B C.The Electronic Communications Privacy Act (ECPA) D. The Communications Assistance to Law Enforcement Act

A. The CAN-SPAM Act

5. If an Internet service provider (ISP) or any other communications network stores an email, retrieval of that evidence must be analyzed under __________. This creates statutory restrictions on government access to such evidence from ISPs or other electronic communications service providers. A. the Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. the Communications Assistance to Law Enforcement Act D. the USA Patriot Act

A. the Electronic Communications Privacy Act (ECPA)

8. __________ aims at perpetrators who attempt to hide the pornographic nature of their web sites, often to make it more accessible to minors. A. The Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. The Communications Assistance to Law Enforcement Act D. The USA Patriot Act

B. 18 U.S.C. 2252B

12. What term is used to describe a protocol used to receive email that works on port 110? A. Internet Message Access Protocol (IMAP) B. Post Office Protocol version 3 (POP3) C. TCP/IP D. Simple Mail Transfer Protocol (SMTP)

B. Post Office Protocol version 3 (POP3)

11. What is Internet Message Access Protocol (IMAP)? A. A protocol used to receive email that works on port 35 B. A protocol used to receive email that works on port 25 C. A protocol used to receive email that works on port 143 D. A protocol used to receive email that works on port 110

C. A protocol used to receive email that works on port 143

7. __________ is a U.S. law that prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between foreign powers and agents of foreign powers, which may include American citizens and permanent residents suspected of espionage or terrorism. A. The Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. Foreign Intelligence Surveillance Act (FISA) D. The USA Patriot Act

C. Foreign Intelligence Surveillance Act (FISA)

2. The email __________ keeps a record of the message's journey as it travels through a communications network. A. client B. account C. header D. protocol

C. header

15. What is Simple Mail Transfer Protocol (SMTP)? A. A protocol used to receive email that works on port 125 B. A protocol used to receive email that works on port 110 C. A protocol used to receive email that works on port 143 D. A protocol used to send email that works on port 25

D. A protocol used to send email that works on port 25

14. The process of sending an email message to an anonymizer is the definition of what? A. Spoofing B. Hacking C. Spamming D. Anonymous remailing

D. Anonymous remailing

16. RFC 3864 describes message header field names. Information about how the message is to be displayed, usually a Multipurpose Internet Mail Extensions (MIME) type, refers to which header field? A. References B. Precedence C. Received D. Content-Type

D. Content-Type

10. What common email header field includes tracking information generated by mail servers that have previously handled a message, in reverse order? A. Content-Type B. Precedence C. References D. Received

D. Received

13. What name is given to a protocol used to send email that works on port 25? A. Internet Message Access Protocol (IMAP) B. Post Office Protocol version 3 (POP3) C. RFC 2822 D. Simple Mail Transfer Protocol (SMTP)

D. Simple Mail Transfer Protocol (SMTP)

6. The __________ has significantly reduced restrictions on law enforcement agencies 'gathering of intelligence within the United States. It has also expanded the Secretary of the Treasury's authority to regulate financial transactions, particularly those involving foreign individuals and entities. A. The Electronic C ommunications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. Foreign Intelligence Surveillance Act (FISA) D. The USA Patriot Act

D. The USA Patriot Act

1. The Electronic Communications Privacy Act requires an investigator to have a wiretap order to acquire ___________ information from an Internet service provider (ISP). A. transactional B. basic subscriber C. content D. real-time access

D. real-time access

4. The only requirement of __________ is that the sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out. A. the Electronic Communications Privacy Act B. 18 U.S.C. 2252B C. the Communications Assistance to Law Enforcement Act D. the CAN-SPAM Act

D. the CAN-SPAM Act


Conjuntos de estudio relacionados

Chapter: Taxes, Retirement, and Other Insurance Concepts

View Set

AHP117 Chapter 13 Intro to the Cardiovascular System

View Set

Bio Honors (The Digestive and Excretory Systems)

View Set