Exam 11: Live Acquisitions and Network Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms with the correct definition below: -?An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that's added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value.

(Multiple Choice)
4.9/5
(31)

In order to retrieve logs from exchange, the PowerShell cmdlet _______________________ can be used.​

(Multiple Choice)
4.8/5
(43)

Match the following terms with the correct definition below: -A law enacted in 1986 to extend the Wiretap Act to cover e-mail and other data transmitted via the Internet.?

(Multiple Choice)
4.7/5
(47)

What information is not typically included in an e-mail header?​

(Multiple Choice)
4.7/5
(37)

Which option below is the correct path to the sendmail configuration file?​

(Multiple Choice)
4.8/5
(41)

On a UNIX system​, where is a user's mail stored by default?

(Multiple Choice)
4.8/5
(38)

E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​

(Multiple Choice)
4.8/5
(47)

Syslog is generally configured to put all e-mail related log information into what file?​

(Multiple Choice)
4.9/5
(34)

​In older versions of exchange, what type of file was responsible for messages formatted with Messaging Application Programming Interface, and served as the database file?

(Multiple Choice)
4.8/5
(26)

Match the following terms with the correct definition below: -?A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet.

(Multiple Choice)
4.9/5
(38)

Match the following terms with the correct definition below: -?A type of e-mail scam that's typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.

(Multiple Choice)
4.8/5
(39)

Describe the two different types of Facebook profiles.

(Essay)
4.8/5
(32)

What kind of files are created by Exchange while converting binary data to readable text in order to prevent loss of data?​

(Multiple Choice)
4.8/5
(37)

Many web-based e-mail providers offer _______________ services, such as Yahoo! Messenger and Google Talk. a.​client server ​/ architecture

(Short Answer)
4.9/5
(41)

Similar to ARIN, the ____________ can be used to find a domain's IP address and point of contact.?

(Short Answer)
4.7/5
(31)

One of the most noteworthy e-mail scams was 419, otherwise known as the _______________.​

(Multiple Choice)
4.9/5
(37)

​Select the program below that can be used to analyze mail from Outlook, Thunderbird, and Eudora.

(Multiple Choice)
4.8/5
(46)

The Suni Munshani v. Signal Lake Venture Fund II, LP et al case is an example of a case that involves e-mail ____________.​

(Multiple Choice)
4.9/5
(43)

​What is Exchange, and what information within Exchange is most valuable to investigations?

(Essay)
4.9/5
(41)

Where does the Postfix UNIX mail server store e-mail?​

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)