ISTC2071 – Computer Forensics Chapter 11 Study Guide

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

What name is used for the configuration typically used for e-mail messages that are
distributed from a central server to many connected client computers?

Client/server architecture

2
New cards

In an e-mail address, what symbol separates the domain name from the rest of the
address?

@

3
New cards

In what type of e-mail programs can the user copy an e-mail message by dragging
the message to a storage medium, such as a folder or drive?

GUI

4
New cards

What is the main information being sought when examining e-mail headers?

The originating e-mail’s domain name or an IP address

5
New cards

To retrieve e-mail headers in Microsoft Outlook, what option should be clicked after
the e-mail has been selected?

File, Properties

6
New cards

In Web-based e-mail, how are messages displayed and saved?

As web pages

7
New cards

In which discipline do professionals listen to voice recordings to determine who's
speaking or read e-mail and other writings known to be by a certain person and
determine whether that person wrote the e-mail or letter in question?

Forensic linguistics

8
New cards

To view Gmail Web e-mail headers, what should be clicked after the e-mail has
been opened and the down arrow next to the Reply circular arrow has been clicked?

Show original

9
New cards

To view e-mail headers on Yahoo!, what should be clicked on after "More" has been
selected?

View Raw Message

10
New cards

In Microsoft Outlook, what file extension is used with saved sent, drafted, deleted,
and received e-mails?

.pst

11
New cards

Which site can be used to verify the names of domains a message is flowing
through?

www.dkim.org

12
New cards

Which type of logging allocates space for a log file on the server, and then starts
overwriting from the beginning when logging reaches the end of the time frame or
the specified log size?

Circular logging

13
New cards

Which files provide helpful information to an e-mail investigation?

Log and configuration files

14
New cards

Which location contains configuration information for Sendmail?

/etc/sendmail.cf

15
New cards

In which directory do UNIX installations typically store logs?

/var/log

16
New cards

In which log does Exchange log information about changes to its data?

Transaction

17
New cards

In Exchange, what type of file is inserted in the transaction log to mark the last point
at which the database was written to disk in order to prevent loss of data?

Checkpoint

18
New cards

In Microsoft Exchange, which file is responsible for messages formatted with MAPI?

.edb

19
New cards

Which information from Facebook simply tells you the last time a person logged on,
the person's e-mail address and mobile number, and whether the account can be
viewed publicly?

Basic subscriber

20
New cards

What format is used for the flat plaintext files some e-mail systems use for message
storage?

mbox