Exam 11: Live Acquisitions and Network Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Committing crimes with e-mail is uncommon, and investigators are not generally tasked with linking suspects to e-mail.​

Free
(True/False)
4.7/5
(34)
Correct Answer:
Verified

False

After a crime has been committed involving e-mail, how should forensics investigators proceed?​

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

Forensics investigators should access the victim's computer or mobile device to recover the evidence on it. Using the victim's e-mail client, find and copy any potential evidence. It might be necessary to log on to the e-mail service and access any protected or encrypted files or folders. With a corporate investigation, be sure policies are in place for this action. For a criminal investigation, you need warrants to access or get copies of files on a server. When dealing with a stalker, if you can't actually sit down at the victim's computer, you might have to guide the victim on the phone to open and print a copy of an offending message, including the header. The header contains unique identifying numbers, such as the IP address of the server that sent the message. This information helps you trace the e-mail to the suspect.

Explain some of the difficulties in using social media sites as sources of forensic data.​

Free
(Essay)
4.7/5
(41)
Correct Answer:
Verified

Part of the challenge in using social media information is that the data is spread over many servers, providers, and users, often requiring techniques used for "big data analytics". Additionally, social media networks can involve multiple jurisdictions that might even cross national boundaries, and social media vendors may prohibit access to their servers. Access to this information requires a warrant or subpoena. Services such as those offered by Facebook, MySpace, and other OSNs usually have legal staff that evaluate requests. Twitter, however, opposes government requests and cites the U.S. Fourth Amendment to refuse all requests.

Match the following terms with the correct definition below: -?A network architecture in which each computer or process on the network is a client or server. Clients request services from a server, and a server processes requests from clients.

(Multiple Choice)
4.8/5
(43)

What service below can be used to map an IP address to a domain name, and then find the domain name's ​point of contact?

(Multiple Choice)
4.8/5
(42)

Match the following terms with the correct definition below: -?A method of storing e-mail messages in a flat plaintext file

(Multiple Choice)
4.9/5
(39)

Match the following terms with the correct definition below: -A protocol for retrieving e-mail messages; it's slowly replacing POP3.

(Multiple Choice)
4.9/5
(32)

​In what state is sending unsolicited e-mail illegal?

(Multiple Choice)
4.9/5
(38)

​What is the syslog.conf file, and how is it used?

(Essay)
4.8/5
(39)

Match the following terms with the correct definition below: -?A term researchers use for social media.

(Multiple Choice)
4.9/5
(36)

?Exchange servers maintain message logs in the ________________ log file.

(Short Answer)
4.9/5
(29)

Which service below does not put log information into ​/ var​/ log​/ maillog?​

(Multiple Choice)
4.9/5
(34)

Match the following terms with the correct definition below: -A type of e-mail scam that uses DNS poisoning to redirect readers to a fake Web site.?

(Multiple Choice)
4.8/5
(39)

Describe the Nigerian scam​.

(Essay)
4.8/5
(36)

The _______________ utility can be used to repair .ost and .pst files, and is included with Microsoft Outlook.​

(Multiple Choice)
4.8/5
(32)

List three (3) web pages that can be used to determine point of contact for a domain, and describe how each is used.​

(Essay)
4.7/5
(45)

?The ____________________ includes logging instructions and is located within the ?/ etc directory. It determines what happens to an e-mail when it is logged: the event, priority level, and the action taken.

(Short Answer)
4.8/5
(42)

Match the following terms with the correct definition below: -The Microsoft system that enables other e-mail applications to work with each other?

(Multiple Choice)
4.8/5
(41)

Exchange uses an Exchange database and is based on the _______________________, which uses several files in different combinations to provide e-mail service.?

(Multiple Choice)
4.8/5
(37)

In an e-mail address, everything before the @ symbol represents the domain name.​

(True/False)
4.7/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)