IS4670 CHAPTER 10 Investigating and Scrutinizing E-mail Flashcards

1
Q
  1. The ________ is like an electronic post office: It sends and receives electronic mail.
A

Mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. A software program used to compose and read e-mail messages is referred to as ________.
A

An e-mail client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. A forensic investigator can find copies of e-mail messages in a number of places. Which of the following are some of them? (Select three.)
A. The recipient’s computer 
B. The sender’s computer 
C. The Whois database 
D. The e-mail header
E. The sender’s mail server
A

The recipient’s computer

The sender’s computer

The sender’s mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Microsoft Outlook, Windows Mail, Gmail, Yahoo! Mail, Hotmail, and AOL are examples of mail servers.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
5. What is the name of the numeric label that identifies each device on a network and provides a location address?
A. E-mail header 
B. Mail server 
C. IP address 
D. Sniffer
A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. As an e-mail message is routed through one or more mail servers, each server adds its own information to the message header.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. It is possible to reconstruct the journey of an e-mail message by reading the e-mail header from top to bottom.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. The ________ lines list every point an e-mail passed through on its journey, along with the date and time.
A

“Received:”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. Which of the following are common methods of faking e-mails? (Select three.)
A. Spoofing 
B. Routing 
C. Anonymous remailing 
D. Spamming 
E. Adding an attachment
A

Spoofing

Anonymous remailing

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. Which of the following is the name for making an e-mail message appear to come from someone or someplace other than the real sender or location?
A. Spoofing 
B. Routing 
C. Anonymous remailing 
D. Spamming 
E. Adding an attachment
A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Keyword filters, IP database block lists, whitelists, and graylists are examples of methods used to prevent or reduce ________.
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
12. Which of the following is not a legal consideration in investigating e-mail?
A. ECPA 
B. Fourth Amendment 
C. Fifth Amendment 
D. State laws
A

Fifth Amendment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly