forensics-chapter 12

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following types of files can provide useful information when you're examining an e-mail server?

.log files

In Microsoft Outlook, what are the e-mail storage files typically found on a client computer?

.pst and .ost

What information is not in an e-mail header? (Choose all that apply.)A) Blind copy (Bcc) addresses B) Internet addresses C) Domain name D) Contents of the message E) Type of e-mail server used to send the message

A) Blind copy (Bcc) addresses D) Contents of the message

When searching a victim's computer for a crime committed with a specific e-mail, which of the following provides information for determining the e-mail's originator? (Choose all that apply.) A) E-mail header B) Username and password C) Firewall log D) All of the above

A) E-mail header C) Firewall log

E-mail headers contain which of the following information? (Choose all that apply.) A)The sender and receiver e-mail addresses B)An Enhanced Simple Mail Transport Protocol (ESMTP) or reference number C)The e-mail servers the message traveled through to reach its destination D)The IP address of the receiving server E)All of the above

A)The sender and receiver e-mail addresses B)An Enhanced Simple Mail Transport Protocol (ESMTP) or reference number C)The e-mail servers the message traveled through to reach its destination

To trace an IP address in an e-mail header, what type of lookup service can you use? (Choose all that apply.) A) AT&T AnyWho online directory B) Verizon's superpages.com C) A domain lookup service, such as www.arin.net, www.internic.com, or www.whois.net D) Any Web search engine

C) A domain lookup service, such as www.arin.net, www.internic.com, or www.whois.net D) Any Web search engine

When you access your e-mail, what type of computer architecture are you using?

Client/server

Logging options on many e-mail servers can be: A) Disabled by the administrator B) Set up in a circular logging configuration C) Configured to a specific size before overwritten D) All of the above

D) All of the above

UNIX, NetWare, and Microsoft e-mail servers create specialized databases for every e-mail user. True or False?

False

Which of the following is a current formatting standard for e-mail?

MIME

What's the main piece of information you look for in an e-mail message you're investigating?

Originating e-mail domain or IP address

When confronted with an e-mail server that no longer contains a log with the date information you require for your investigation, and the client has deleted the e-mail, what should you do?

Restore the e-mail server from a backup.

In UNIX e-mail, the syslog.conf file contains what information?

The event, the priority level of concern, and the action taken when an e-mail is logged

Router logs can be use for validating what types of e-mail data?

Tracking flows through e-mail server ports

All e-mail headers contain the same types of information. True or False?

True

Internet e-mail accessed with a Web browser leaves files in temporary folders. True or False?

True

You can view e-mail headers in all popular e-mail clients. True or False?

True


Conjuntos de estudio relacionados

Ch 6 Greek Art Video Quiz A (Classical Revolution Part 1)

View Set

Chapter 10 Managing Conflict & Negotiations Practice Quiz

View Set