Module 11 Quiz Flashcards

1
Q

Which of the following types of files can provide useful information when you’re examining an e-mail server?

.emx files

.slf files

.log files

.dbf files

A

.log files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After examining e-mail headers to find an e-mail’s originating address, investigators use forward lookups to track an e-mail to a suspect.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What information is not in an e-mail header?

Domain name

Internet addresses

Blind copy (bcc) addresses

All of the above

A

Blind copy (bcc) addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To trace an IP address in an e-mail header, what type of lookup service can you use?

Intelius Inc.’s AnyWho online directory

Verizon’s http://superpages.com

A domain lookup service, such as www.arin.net, www.internic.com, or www.whois.net

None of the above

A

A domain lookup service, such as www.arin.net, www.internic.com, or www.whois.net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When confronted with an e-mail server that no longer contains a log with the date information you need for your investigation, and the client has deleted the e-mail, what should you do?

Check the current database files for an existing copy of the e-mail.

Search available log files for any forwarded messages.

Restore the e-mail server from a backup.

Do nothing because after the file has been deleted, it can no longer be recovered.

A

Restore the e-mail server from a backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To analyze e-mail evidence, an investigator must be knowledgeable about an e-mail server’s internal operations.

True

False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When searching a victim’s computer for a crime committed with a specific e-mail, which of the following provides information for determining the e-mail’s originator?

a: E-mail header

b: Username and password

c: Firewall log

Both a and c

A

Both a and c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Phishing does which of the following?

Uses DNS poisoning

Uses DHCP

Lures users with false promises

Takes people to fake Web sites

A

Lures users with false promises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the main piece of information you look for in an e-mail message you’re investigating?

Message number

Sender or receiver’s e-mail address

Subject line content

Originating e-mail domain or IP address

A

Originating e-mail domain or IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On a UNIX-like system, which file specifies where to save different types of e-mail log files?

/var/spool/log

syslog.conf

maillog

log

A

syslog.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In Microsoft Outlook, e-mails are typically stored in which of the following?

.evolution file

res1.log and res2.log files

.pst and .ost files

PU020102.db file

A

.pst and .ost files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sendmail uses which file for instructions on processing an e-mail message?

syslogd.conf

sendmail.cf

mapi.log

mese.ese

A

sendmail.cf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A forensic linguist can determine an author’s gender by analyzing chat logs and social media communications.

True

False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logging options on e-mail servers can be which of the following?

a: Disabled by users

b: Set up in a circular logging configuration

c: Configured to a specified size before being overwritten

Both b and c

A

c: Configured to a specified size before being overwritten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you access your e-mail, what type of computer architecture are you using?

Domain

Client/server

Mainframe and minicomputers

None of the above

A

Client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

E-mail accessed with a Web browser leaves files in temporary folders.

True

False

A

True

17
Q

Router logs can be used to verify what types of e-mail data?

Tracking flows through e-mail server ports

Finding blind copies

Message content

Content of attached files

A

Tracking flows through e-mail server ports

18
Q

E-mail headers contain which of the following information?

An ESMTP number or reference number

The sender and receiver e-mail addresses

The e-mail servers the message traveled through to reach its destination

All of the above

A

All of the above

19
Q

Which of the following is a current formatting standard for e-mail?

HTML

Outlook

SMTP

MIME

A

MIME

20
Q

You can view e-mail headers in Notepad with all popular e-mail clients.

True x

False

A

True
False