Textbook solutions
Students also studied
Study guides
Social Psychology
10th Edition•ISBN: 9780134700724Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson
525 solutions
Human Resource Management
15th Edition•ISBN: 9781337520164John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine
249 solutions
Practice questions for this set
b. Originating e-mail domain name or IP address
Phishing does which of the following?
a. Uses DNS poisoning
b. Lures users with false promises
c. Takes people to tát fake Web sites
d. Uses DHCP
What's the main piece of information you look for in an e-mail message you're investigating?
a. Sender or receiver's e-mail address
b. Originating e-mail domain name or IP address
c. Subject line nội dung
d. Message number
What information is not in an e-mail header? (Choose all that apply.)
a. Blind copy (bcc) addresses
b. Internet addresses
c. Domain name
d. Contents of the message
e. Type of e-mail server used to tát send the e-mail
When you access your e-mail, what type of computer architecture are you using?
a. Mainframe and minicomputers
b. Domain
c. Client/server
d. None of the above
E-mail headers contain which of the following information? (Choose all that apply.) a. The sender and receiver e-mail addresses
b. An Enhanced Simple Mail Transport Protocol(ESMTP) number or reference number
c. The e-mail servers the message traveled through to tát reach its destination
d. The IP address of the receiving server
e. All of the above
a. The sender and receiver e-mail addresses
b. An Enhanced Simple Mail Transport Protocol(ESMTP) number or reference number
c. The e-mail servers the message traveled through to tát reach its destination
What's the main piece of information you look for in an e-mail message you're investigating? a. Sender or receiver's e-mail address
b. Originating e-mail domain name or IP address
c. Subject line nội dung
d. Message number
b. Originating e-mail domain name or IP address
In Microsoft Outlook, e-mails are typically stored in which of the following? a. .pst and .ost files
b. res1.log and res2.log files
c. PU020102.db tệp tin
d. .evolution file
When searching a victim's computer for a crime committed with a specific a. E-mail header
e-mail, which of the following provides information for determining the e-mail's originator? (Choose all that apply.)
b. Username and password
c. Firewall log
d. All of the above
a. E-mail header
c. Firewall log
Phishing does which of the following? a. Uses DNS poisoning
b. Lures users with false promises
c. Takes people to tát fake Web sites
d. Uses DHCP
b. Lures users with false promises
Which of the following is a current formatting standard for e-mail? a. SMTP
b. MIME
c. Outlook
d. HTML
After examining e-mail headers to tát find an e-mail's originating address, investigators use forward lookups to tát track an e-mail to tát a suspect. True or False?
When you access your e-mail, what type of computer architecture are you using? a. Mainframe and minicomputers
b. Domain
c. Client/server
d. None of the above
To trace an IP address in an e-mail header, what type of lookup service can you use? (Choose all that apply.) a. Intelius Inc.'s AnyWho online directory
b. Verizon's http://superpages.com
c. A domain name lookup service, such as www.arin.net, www.internic.com, or www.whois.net
d. Any Web tìm kiếm engine
c. A domain name lookup service, such as www.arin.net, www.internic.com, or www.whois.net
d. Any Web tìm kiếm engine
Router logs can be used to tát verify what types of e-mail data? a. Message nội dung
b. Content of attached files
c. Tracking flows through e-mail server ports
d. Finding blind copies
c. Tracking flows through e-mail server ports
Logging options on e-mail servers can be which of the following? (Choose all that apply.) a. Disabled by users
b. Set up in a circular logging configuration
c. Configured to tát a specified size before being overwritten
d. Typically phối to tát periodic logging mode
b. Set up in a circular logging configuration
c. Configured to tát a specified size before being overwritten
On a UNIX-like system, which tệp tin specifies where to tát save different types of e-mail log files? a. maillog
b. /var/spool/log
c. syslog.conf
d. log
What information is not in an e-mail header? (Choose all that apply.) a. Blind copy (bcc) addresses
b. Internet addresses
c. Domain name
d. Contents of the message
e. Type of e-mail server used to tát send the e-mail
a. Blind copy (bcc) addresses
d. Contents of the message
Which of the following types of files can provide useful information when you're examining an e-mail server? a. .dbf files
b. .emx files
c. .log files
d. .slf file
E-mail accessed with a Web browser leaves files in temporary folders. True or False?