Exam 8: E-Mail and Webmail Forensics
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the e-mail header information with its description.
Premises:
To
Responses:
Used if sender requests an automated confirmation of the recipient having read the e-mail
Deals with non-text items such as photos
Easily spoofed by hackers
Correct Answer:
Premises:
Responses:
Free
(Matching)
4.8/5
(41)
Correct Answer:
To handle attachments now being included in e-mail,________ ,a new standard,was introduced.
Free
(Short Answer)
4.9/5
(32)
Correct Answer:
MIME
In Outlook Express,each e-mail account is given a Microsoft ________,which is a unique hexadecimal representation for that account.
Free
(Short Answer)
4.7/5
(35)
Correct Answer:
"Identity"
According to many Americans,________ violate their privacy and their First Amendment rights.
(Short Answer)
4.8/5
(30)
What percentage of firms have said they have fired workers for Internet misuse?
(Multiple Choice)
4.9/5
(35)
Attachments are normally handled using a(n)_______ binary-to-text encoding scheme.
(Short Answer)
5.0/5
(36)
Where is the best place to look for evidence that a person has been using webmail?
(Multiple Choice)
4.7/5
(39)
A check of the ________ will determine how long a company keeps e-mails.
(Short Answer)
4.9/5
(32)
Match the type of e-mail protocol to the correct characteristic(s).
-Webmail
(Multiple Choice)
4.8/5
(43)
Which of the following are NOT considered important when working with RAID systems?
(Multiple Choice)
4.8/5
(34)
The logical address of the sender is composed of two parts:
(Multiple Choice)
4.8/5
(36)
Match the e-mail header information with its description.
-Apparently-To
(Multiple Choice)
4.8/5
(35)
Place the following steps into the correct order for e-mail delivery:
-Fourth step
(Multiple Choice)
4.9/5
(54)
Match the IM program with its description.
-Windows Messenger
(Multiple Choice)
4.9/5
(43)
E-mail attachments can be found within slack space by searching for
(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)