Exam 11: Live Acquisitions and Network Forensics
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
Match the following terms with the correct definition below:
-?An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that's added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value.
(Multiple Choice)
4.9/5
(31)
In order to retrieve logs from exchange, the PowerShell cmdlet _______________________ can be used.
(Multiple Choice)
4.8/5
(43)
Match the following terms with the correct definition below:
-A law enacted in 1986 to extend the Wiretap Act to cover e-mail and other data transmitted via the Internet.?
(Multiple Choice)
4.7/5
(47)
What information is not typically included in an e-mail header?
(Multiple Choice)
4.7/5
(37)
Which option below is the correct path to the sendmail configuration file?
(Multiple Choice)
4.8/5
(41)
On a UNIX system, where is a user's mail stored by default?
(Multiple Choice)
4.8/5
(38)
E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.
(Multiple Choice)
4.8/5
(47)
Syslog is generally configured to put all e-mail related log information into what file?
(Multiple Choice)
4.9/5
(34)
In older versions of exchange, what type of file was responsible for messages formatted with Messaging Application Programming Interface, and served as the database file?
(Multiple Choice)
4.8/5
(26)
Match the following terms with the correct definition below:
-?A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet.
(Multiple Choice)
4.9/5
(38)
Match the following terms with the correct definition below:
-?A type of e-mail scam that's typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.
(Multiple Choice)
4.8/5
(39)
What kind of files are created by Exchange while converting binary data to readable text in order to prevent loss of data?
(Multiple Choice)
4.8/5
(37)
Many web-based e-mail providers offer _______________ services, such as Yahoo! Messenger and Google Talk.
a.client server / architecture
(Short Answer)
4.9/5
(41)
Similar to ARIN, the ____________ can be used to find a domain's IP address and point of contact.?
(Short Answer)
4.7/5
(31)
One of the most noteworthy e-mail scams was 419, otherwise known as the _______________.
(Multiple Choice)
4.9/5
(37)
Select the program below that can be used to analyze mail from Outlook, Thunderbird, and Eudora.
(Multiple Choice)
4.8/5
(46)
The Suni Munshani v. Signal Lake Venture Fund II, LP et al case is an example of a case that involves e-mail ____________.
(Multiple Choice)
4.9/5
(43)
What is Exchange, and what information within Exchange is most valuable to investigations?
(Essay)
4.9/5
(41)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)