Exam 8: E-Mail and Webmail Forensics
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
What portion of an e-mail records such information as the identity of the creator?
(Multiple Choice)
4.8/5
(36)
Working with mail servers can be a challenge for all of the following reasons EXCEPT
(Multiple Choice)
4.8/5
(37)
Which RAID array uses a minimum of three disks,two for striping and one to store parity information?
(Multiple Choice)
4.8/5
(39)
Which of the following file extensions would most likely be found in an e-mail search for someone using Outlook?
(Multiple Choice)
4.8/5
(35)
The tool often used for quick communications without resorting to e-mail is________ .
(Short Answer)
4.8/5
(36)
E-mail client programs are generally configured to communicate with
(Multiple Choice)
4.8/5
(35)
Match the e-mail header information with its description.
-Content-Type
(Multiple Choice)
4.9/5
(39)
________ uses two or more hard drives accessed in parallel to create a pool of storage.
(Short Answer)
4.8/5
(34)
E-mail software is a(n)________ program that works in concert with a(n)________.
(Short Answer)
4.8/5
(36)
You can look in the ________ folder to find applications such as Eudora or Lotus Notes.
(Short Answer)
4.8/5
(39)
Match the type of e-mail protocol to the correct characteristic(s).
-POP3
(Multiple Choice)
4.8/5
(41)
One of the challenges when trying to find webmail evidence is that
(Multiple Choice)
4.7/5
(28)
If you found the mail[#] keyword in an evidence search,you could assume the user has access to the ________ webmail program.
(Short Answer)
4.8/5
(44)
Match the e-mail header information with its description.
-X-Confirm-Reading-To
(Multiple Choice)
4.8/5
(37)
Place the following steps into the correct order for e-mail delivery:
-Second step
(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)