Digital Forensics CH.11

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

17. You can view e-mail headers in Notepad with all popular e-mail clients. True or False?

False

20. A forensic linguist can determine an author's gender by analyzing chat logs and social media communications. True or False?

False

15. E-mail accessed with a Web browser leaves files in temporary folders. True or False?

True

18. To analyze e-mail evidence, an investigator must be knowledgeable about an e-mail server's internal operations. True or False?

True

7. After examining e-mail headers to find an e-mail's originating address, investigators use forward lookups to track an e-mail to a suspect. True or False?

True

3. In Microsoft Outlook, e-mails are typically stored in which of the following?

a. .pst and .ost files

13. What information is not in an e-mail header? (Choose all that apply.)

a. Blind copy (bcc) addresses d. Contents of the message

4. When searching a victim's computer for a crime committed with a specific e-mail, which of the following provides information for determining the e-mail's originator? (Choose all that apply.)

a. E-mail header c. Firewall log

19. Sendmail uses which file for instructions on processing an e-mail message?

a. Sendmail.cf

1. E-mail headers contain which of the following information? (Choose all that apply.)

a. The sender and receiver e-mail addresses b. An ESMTP number or reference number c. The e-mail servers the message traveled through to reach its destination

5. Phishing does which of the following?

b. Lures users with false promises

6. Which of the following is a current formatting standard for e-mail?

b. MIME

2. What's the main piece of information you look for in an e-mail message you're investigating?

b. Originating e-mail domain or IP address

16. When confronted with an e-mail server that no longer contains a log with the date information you require for your investigation, and the client has deleted the e-mail, what should you do?

b. Restore the e-mail server from a backup.

11. Logging options on e-mail servers can be which of the following? (Choose all that apply.)

b. Set up in a circular logging configuration c. Configured to a specified size before being overwritten

14. Which of the following types of files can provide useful information when you're examining an e-mail server?

c. .log files

9. To trace an IP address in an e-mail header, what type of lookup service can you use? (Choose all that apply.)

c. A domain lookup service, such as www.arin.net, www.internic.com, or www.whois.net d. Any Web search engine

8. When you access your e-mail, what type of computer architecture are you using?

c. Client/server

10. Router logs can be use for validating what types of e-mail data?

c. Tracking flows through e-mail server ports

12. On a UNIX-like system, which file specifies where to save different types of e-mail log files?

c. syslog.conf


संबंधित स्टडी सेट्स

Test 1 - Maternity by Lowdermilk & Perry: Chapters 12, 13, 14, 15, 26

View Set

CH 8 Concepts Review & Self Study

View Set

Ch. 6 Entrepreneurship And Starting A New Business (Understanding Business)

View Set

Graphs for solving equations Y10 (BR)

View Set

Test 10 - End of Life, Grief, Loss, Spirituality, and Legal

View Set

Passage 6c: Thomas Paine, Common Sense

View Set

How to Eat Fried Worms: Section 2- Chapters 10-15

View Set

Recovery, recycling, and handling

View Set