IS4670 CHAPTER 10 Investigating and Scrutinizing E-mail Flashcards
1
Q
- The ________ is like an electronic post office: It sends and receives electronic mail.
A
Mail server
2
Q
- A software program used to compose and read e-mail messages is referred to as ________.
A
An e-mail client
3
Q
3. A forensic investigator can find copies of e-mail messages in a number of places. Which of the following are some of them? (Select three.) A. The recipient’s computer B. The sender’s computer C. The Whois database D. The e-mail header E. The sender’s mail server
A
The recipient’s computer
The sender’s computer
The sender’s mail server
4
Q
- Microsoft Outlook, Windows Mail, Gmail, Yahoo! Mail, Hotmail, and AOL are examples of mail servers.
A. True
B. False
A
False
5
Q
5. What is the name of the numeric label that identifies each device on a network and provides a location address? A. E-mail header B. Mail server C. IP address D. Sniffer
A
IP address
6
Q
- As an e-mail message is routed through one or more mail servers, each server adds its own information to the message header.
A. True
B. False
A
True
7
Q
- It is possible to reconstruct the journey of an e-mail message by reading the e-mail header from top to bottom.
A. True
B. False
A
False
8
Q
- The ________ lines list every point an e-mail passed through on its journey, along with the date and time.
A
“Received:”
9
Q
9. Which of the following are common methods of faking e-mails? (Select three.) A. Spoofing B. Routing C. Anonymous remailing D. Spamming E. Adding an attachment
A
Spoofing
Anonymous remailing
Spamming
10
Q
10. Which of the following is the name for making an e-mail message appear to come from someone or someplace other than the real sender or location? A. Spoofing B. Routing C. Anonymous remailing D. Spamming E. Adding an attachment
A
Spoofing
11
Q
- Keyword filters, IP database block lists, whitelists, and graylists are examples of methods used to prevent or reduce ________.
A
Spam
12
Q
12. Which of the following is not a legal consideration in investigating e-mail? A. ECPA B. Fourth Amendment C. Fifth Amendment D. State laws
A
Fifth Amendment