Quiz on Email and Social Media Investigations - Module 13

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Email headers contain which of the following information?

a. Sender and receiver email addresses

b. ESMTP number or reference number

c. The email servers the message traveled through to reach its destination

d. IP address of the receiving server

e. All of these choices

e. All of these choices

2
New cards

What is the first piece of information you should look for in an email message you're investigating?

a. Sender or receiver's email address

b. Originating email domain or IP address

c. Subject line content

d. Message number

a. Sender or receiver's email address

3
New cards

In Microsoft Outlook, emails are typically stored in which of the following?

a. .pst and .ost files

b. res1.log and res2.log files

c. PU020102.db file

d. .evolution file

a. .pst and .ost files

4
New cards

When searching a victim's computer for a crime committed with a specific email, which of the following provides information for determining the email's originator? (Choose all that apply.)

a. Email header

b. Username and password

c. Firewall log

d. All of these choices

a. Email header

c. Firewall log

5
New cards

Phishing does which of the following?

a. Uses DNS poisoning

b. Lures recipients with false promises

c. Takes people to fake websites

d. Uses DHCP

b. Lures recipients with false promises

6
New cards

Which of the following is a current formatting standard for email?

a. SMTP

b. MIME

c. Outlook

d. HTML

b. MIME

7
New cards

After examining email headers to find an email's originating address, investigators use forward lookups to track an email to a suspect. True or False?

a. True

b. False

b. False

8
New cards

When you access your email, what type of computer architecture are you using?

a. Mainframe and minicomputers

b. Domain

c. Client/server

d. None of these choices

c. Client/server

9
New cards

To trace an IP address in an email header, what type of lookup service can you use?

a. Intelius Inc.'s AnyWho online directory

b. Verizon's http://superpages.com

c. A domain lookup service, such as arin.net, internic.com, or whois.net

d. Any web search engine

c. A domain lookup service, such as arin.net, internic.com, or whois.net

10
New cards

Router logs can be used to verify what types of email data?

a. Message content

b. Content of attached files

c. Tracking flows through email server ports

d. Finding blind copies

c. Tracking flows through email server ports

11
New cards

Logging options on email servers can be which of the following? (Choose all that apply.)

a. Disabled by users

b. Set up in a circular logging configuration

c. Configured to a specified size before being overwritten

d. Set to periodic logging mode

b. Set up in a circular logging configuration

c. Configured to a specified size before being overwritten

d. Set to periodic logging mode

12
New cards

On a UNIX-like system, which file specifies where to save different types of email log files?

a. maillog

b. /var/spool/log

c. syslog.conf

d. log

c. syslog.conf

13
New cards

What information is never included in an email header?

a. Blind copy (bcc) addresses

b. Internet addresses

c. Domain name

d. Contents of the message

e. Type of email server used to send the email

d. Contents of the message

14
New cards

Which of the following types of files can provide useful information when you're examining an email server?

a. .dbf files

b. .emx files

c. .log files

d. .slf files

c. .log files

15
New cards

Email accessed with a web browser leaves files in temporary folders. True or False?

a. True

b. False

a. True

16
New cards

When confronted with an email server that no longer contains a log with the date information you need for your investigation and the client has deleted the email, what should you do? (Choose all that apply.)

a. Search available log files for any forwarded messages.

b. Restore the email server from a backup.

c. Check the current database files for an existing copy of the email.

d. Do nothing because after the file has been deleted, it can no longer be recovered.

a. Search available log files for any forwarded messages.

b. Restore the email server from a backup.

c. Check the current database files for an existing copy of the email.

17
New cards

You can view email headers in Notepad with all popular email clients. True or False?

a. True

b. False

a. True

18
New cards

To analyze email evidence, an investigator must be knowledgeable about an email server's internal operations. True or False?

a. True

b. False

b. False

19
New cards

Sendmail uses which file for instructions on processing an email message?

a. sendmail.cf

b. syslogd.conf

c. mese.ese

d. mapi.log

a. sendmail.cf

20
New cards

A forensic linguist may be able to determine if the same person wrote an email by analyzing chat logs and social media communications. True or False?

a. True

b. False

a. True