CH7 Email Forensics
3. __________ involves making an email message appear to come from someone or someplace other than the real sender or location. A. Spoofing B. Stripping C. Extracting D. Transference
A. Spoofing
9. __________ was the first law meant to curtail unsolicited email. However, the law has many loopholes. A. The CAN-SPAM Act B. 18 U.S.C. 2252B C.The Electronic Communications Privacy Act (ECPA) D. The Communications Assistance to Law Enforcement Act
A. The CAN-SPAM Act
5. If an Internet service provider (ISP) or any other communications network stores an email, retrieval of that evidence must be analyzed under __________. This creates statutory restrictions on government access to such evidence from ISPs or other electronic communications service providers. A. the Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. the Communications Assistance to Law Enforcement Act D. the USA Patriot Act
A. the Electronic Communications Privacy Act (ECPA)
8. __________ aims at perpetrators who attempt to hide the pornographic nature of their web sites, often to make it more accessible to minors. A. The Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. The Communications Assistance to Law Enforcement Act D. The USA Patriot Act
B. 18 U.S.C. 2252B
12. What term is used to describe a protocol used to receive email that works on port 110? A. Internet Message Access Protocol (IMAP) B. Post Office Protocol version 3 (POP3) C. TCP/IP D. Simple Mail Transfer Protocol (SMTP)
B. Post Office Protocol version 3 (POP3)
11. What is Internet Message Access Protocol (IMAP)? A. A protocol used to receive email that works on port 35 B. A protocol used to receive email that works on port 25 C. A protocol used to receive email that works on port 143 D. A protocol used to receive email that works on port 110
C. A protocol used to receive email that works on port 143
7. __________ is a U.S. law that prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between foreign powers and agents of foreign powers, which may include American citizens and permanent residents suspected of espionage or terrorism. A. The Electronic Communications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. Foreign Intelligence Surveillance Act (FISA) D. The USA Patriot Act
C. Foreign Intelligence Surveillance Act (FISA)
2. The email __________ keeps a record of the message's journey as it travels through a communications network. A. client B. account C. header D. protocol
C. header
15. What is Simple Mail Transfer Protocol (SMTP)? A. A protocol used to receive email that works on port 125 B. A protocol used to receive email that works on port 110 C. A protocol used to receive email that works on port 143 D. A protocol used to send email that works on port 25
D. A protocol used to send email that works on port 25
14. The process of sending an email message to an anonymizer is the definition of what? A. Spoofing B. Hacking C. Spamming D. Anonymous remailing
D. Anonymous remailing
16. RFC 3864 describes message header field names. Information about how the message is to be displayed, usually a Multipurpose Internet Mail Extensions (MIME) type, refers to which header field? A. References B. Precedence C. Received D. Content-Type
D. Content-Type
10. What common email header field includes tracking information generated by mail servers that have previously handled a message, in reverse order? A. Content-Type B. Precedence C. References D. Received
D. Received
13. What name is given to a protocol used to send email that works on port 25? A. Internet Message Access Protocol (IMAP) B. Post Office Protocol version 3 (POP3) C. RFC 2822 D. Simple Mail Transfer Protocol (SMTP)
D. Simple Mail Transfer Protocol (SMTP)
6. The __________ has significantly reduced restrictions on law enforcement agencies 'gathering of intelligence within the United States. It has also expanded the Secretary of the Treasury's authority to regulate financial transactions, particularly those involving foreign individuals and entities. A. The Electronic C ommunications Privacy Act (ECPA) B. 18 U.S.C. 2252B C. Foreign Intelligence Surveillance Act (FISA) D. The USA Patriot Act
D. The USA Patriot Act
1. The Electronic Communications Privacy Act requires an investigator to have a wiretap order to acquire ___________ information from an Internet service provider (ISP). A. transactional B. basic subscriber C. content D. real-time access
D. real-time access
4. The only requirement of __________ is that the sender must provide some mechanism whereby the receiver can opt out of future emails and that method cannot require the receiver to pay in order to opt out. A. the Electronic Communications Privacy Act B. 18 U.S.C. 2252B C. the Communications Assistance to Law Enforcement Act D. the CAN-SPAM Act
D. the CAN-SPAM Act