Computer Forensics Ch. 11 Flashcards

admin

Textbook solutions

Students also studied

Study guides

Social Psychology 10th Edition by Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

Social Psychology

10th EditionISBN: 9780134700724Elliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

Human Resource Management 15th Edition by John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

Human Resource Management

15th EditionISBN: 9781337520164John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

Practice questions for this set

b. Originating e-mail domain name or IP address

Phishing does which of the following?

a. Uses DNS poisoning
b. Lures users with false promises
c. Takes people to tát fake Web sites
d. Uses DHCP

What's the main piece of information you look for in an e-mail message you're investigating?

a. Sender or receiver's e-mail address
b. Originating e-mail domain name or IP address
c. Subject line nội dung
d. Message number

What information is not in an e-mail header? (Choose all that apply.)

a. Blind copy (bcc) addresses
b. Internet addresses
c. Domain name
d. Contents of the message
e. Type of e-mail server used to tát send the e-mail

When you access your e-mail, what type of computer architecture are you using?

a. Mainframe and minicomputers
b. Domain
c. Client/server
d. None of the above

E-mail headers contain which of the following information? (Choose all that apply.)

a. The sender and receiver e-mail addresses
b. An Enhanced Simple Mail Transport Protocol(ESMTP) number or reference number
c. The e-mail servers the message traveled through to tát reach its destination
d. The IP address of the receiving server
e. All of the above

a. The sender and receiver e-mail addresses
b. An Enhanced Simple Mail Transport Protocol(ESMTP) number or reference number
c. The e-mail servers the message traveled through to tát reach its destination

What's the main piece of information you look for in an e-mail message you're investigating?

a. Sender or receiver's e-mail address
b. Originating e-mail domain name or IP address
c. Subject line nội dung
d. Message number

b. Originating e-mail domain name or IP address

In Microsoft Outlook, e-mails are typically stored in which of the following?

a. .pst and .ost files
b. res1.log and res2.log files
c. PU020102.db tệp tin
d. .evolution file

When searching a victim's computer for a crime committed with a specific
e-mail, which of the following provides information for determining the e-mail's originator? (Choose all that apply.)

a. E-mail header
b. Username and password
c. Firewall log
d. All of the above

a. E-mail header
c. Firewall log

Phishing does which of the following?

a. Uses DNS poisoning
b. Lures users with false promises
c. Takes people to tát fake Web sites
d. Uses DHCP

b. Lures users with false promises

Which of the following is a current formatting standard for e-mail?

a. SMTP
b. MIME
c. Outlook
d. HTML

After examining e-mail headers to tát find an e-mail's originating address, investigators use forward lookups to tát track an e-mail to tát a suspect.

True or False?

When you access your e-mail, what type of computer architecture are you using?

a. Mainframe and minicomputers
b. Domain
c. Client/server
d. None of the above

To trace an IP address in an e-mail header, what type of lookup service can you use? (Choose all that apply.)

a. Intelius Inc.'s AnyWho online directory
b. Verizon's http://superpages.com
c. A domain name lookup service, such as www.arin.net, www.internic.com, or www.whois.net
d. Any Web tìm kiếm engine

c. A domain name lookup service, such as www.arin.net, www.internic.com, or www.whois.net
d. Any Web tìm kiếm engine

Router logs can be used to tát verify what types of e-mail data?

a. Message nội dung
b. Content of attached files
c. Tracking flows through e-mail server ports
d. Finding blind copies

c. Tracking flows through e-mail server ports

Logging options on e-mail servers can be which of the following? (Choose all that apply.)

a. Disabled by users
b. Set up in a circular logging configuration
c. Configured to tát a specified size before being overwritten
d. Typically phối to tát periodic logging mode

b. Set up in a circular logging configuration
c. Configured to tát a specified size before being overwritten

On a UNIX-like system, which tệp tin specifies where to tát save different types of e-mail log files?

a. maillog
b. /var/spool/log
c. syslog.conf
d. log

What information is not in an e-mail header? (Choose all that apply.)

a. Blind copy (bcc) addresses
b. Internet addresses
c. Domain name
d. Contents of the message
e. Type of e-mail server used to tát send the e-mail

a. Blind copy (bcc) addresses
d. Contents of the message

Which of the following types of files can provide useful information when you're examining an e-mail server?

a. .dbf files
b. .emx files
c. .log files
d. .slf file

E-mail accessed with a Web browser leaves files in temporary folders.

True or False?