Deck 8: E-Mail and Webmail Forensics

Full screen (f)
exit full mode
Question
The logical address of the sender is composed of two parts:

A)The client name and the hostname
B)The mailbox and the domain or hostname
C)The server name and the client name
D)The POP3 name and the SMTP name
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following are NOT considered important when working with RAID systems?

A)Transmission speed
B)Type of controller
C)Size of array
D)Type of hard drive
Question
If you found the mail[#] keyword in an evidence search,you could assume the user has access to the ________ webmail program.
Question
What portion of an e-mail records such information as the identity of the creator?

A)The trailer
B)The body
C)The header
D)None of these
Question
What percentage of firms have said they have fired workers for Internet misuse?

A)45 percent
B)22 percent
C)35 percent
D)26 percent
Question
Which of the following file extensions would most likely be found in an e-mail search for someone using Outlook?

A).eml
B).wab
C).dbx
D).mbx
Question
Which RAID array uses a minimum of three disks,two for striping and one to store parity information?

A)RAID 9
B)RAID 5
C)RAID 3
D)RAID 1
Question
Where is the best place to look for evidence that a person has been using webmail?

A)\Documents and Settings\Windowsuserid\Local Settings\Temp
B)\Documents and Settings\Windowsuserid\Local Settings\Temporary Internet Files
C)\Documents and Settings\Windowsuserid\Local Settings\Temporary Files
D)\Documents and Settings\Windowsuserid\Local Settings\Internet Files
Question
?Working with mail servers can be a challenge for all of the following reasons EXCEPT

A)These programs service hundreds or even thousands of accounts
B)It may not be possible to get forensic access to the accounts
C)Servers are particularly hard to access in small companies
D)Companies may have policies in place to limit the time data is retained
Question
Because there is no one standard for instant messaging,

A)Messages often have widely differing formats
B)Both IM participants typically have to use the same chat software
C)IM is generally not used for business purposes
D)An investigator may have to use a generic program to access messages
Question
Of the following,which is NOT considered a Regional Internet Registry?

A)AfriNIC
B)APNIC
C)LATNIC
D)ARIN
Question
E-mail attachments can be found within slack space by searching for

A)The keyword base64
B)The keyword base32
C)The keyword base16
D)The keyword base8
Question
Which of the following is NOT a webmail program?

A)Yahoo!Mail
B)Hotmail
C)LotusMail
D)Gmail
Question
Which e-mail program comes with Microsoft Office?

A)Outlook
B)Outlook Express
C)Eudora
D)Office Notes
Question
A person using webmail may be able to use a program such as ________ to connect to the server and thus download messages to work with offline.
Question
E-mail software is a(n)________ program that works in concert with a(n)________.
Question
One of the challenges when trying to find webmail evidence is that

A)Webmail is more widely used than client programs
B)Webmail accounts are harder to access
C)Webmail accounts are easier to use
D)E-mails from webmail accounts are not typically stored on the user's computer
Question
In Outlook Express,each e-mail account is given a Microsoft ________,which is a unique hexadecimal representation for that account.
Question
You can look in the ________ folder to find applications such as Eudora or Lotus Notes.
Question
E-mail client programs are generally configured to communicate with

A)One or more servers
B)One or more hosts
C)A single user account
D)Internet clients
Question
________ uses two or more hard drives accessed in parallel to create a pool of storage.
Question
The tool often used for quick communications without resorting to e-mail is________ .
Question
According to many Americans,________ violate their privacy and their First Amendment rights.
Question
A(n)________ server resolves domain names to IP addresses.
Question
Attachments are normally handled using a(n)_______ binary-to-text encoding scheme.
Question
Error-corrective coding (ECC),also known as ________,is used to check the validity of striped data.
Question
To handle attachments now being included in e-mail,________ ,a new standard,was introduced.
Question
The ________ comes before the @ sign in an e-mail address
Question
________ is writing the same data in two places.
Question
A check of the ________ will determine how long a company keeps e-mails.
Question
Match between columns
To
Used if sender requests an automated confirmation of the recipient having read the e-mail
To
Easily spoofed by hackers
To
Nonstandard heading sometimes used when encountering a mailing list
To
Deals with non-text items such as photos
Question
Match between columns
First step
Server sends e-mail to final destination
First step
Client sends copy of e-mail to server
First step
User logs onto her e-mail account
First step
User initiates a send session via port 25
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: E-Mail and Webmail Forensics
1
The logical address of the sender is composed of two parts:

A)The client name and the hostname
B)The mailbox and the domain or hostname
C)The server name and the client name
D)The POP3 name and the SMTP name
B
2
Which of the following are NOT considered important when working with RAID systems?

A)Transmission speed
B)Type of controller
C)Size of array
D)Type of hard drive
D
3
If you found the mail[#] keyword in an evidence search,you could assume the user has access to the ________ webmail program.
Gmail
4
What portion of an e-mail records such information as the identity of the creator?

A)The trailer
B)The body
C)The header
D)None of these
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
What percentage of firms have said they have fired workers for Internet misuse?

A)45 percent
B)22 percent
C)35 percent
D)26 percent
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following file extensions would most likely be found in an e-mail search for someone using Outlook?

A).eml
B).wab
C).dbx
D).mbx
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
Which RAID array uses a minimum of three disks,two for striping and one to store parity information?

A)RAID 9
B)RAID 5
C)RAID 3
D)RAID 1
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Where is the best place to look for evidence that a person has been using webmail?

A)\Documents and Settings\Windowsuserid\Local Settings\Temp
B)\Documents and Settings\Windowsuserid\Local Settings\Temporary Internet Files
C)\Documents and Settings\Windowsuserid\Local Settings\Temporary Files
D)\Documents and Settings\Windowsuserid\Local Settings\Internet Files
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
?Working with mail servers can be a challenge for all of the following reasons EXCEPT

A)These programs service hundreds or even thousands of accounts
B)It may not be possible to get forensic access to the accounts
C)Servers are particularly hard to access in small companies
D)Companies may have policies in place to limit the time data is retained
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Because there is no one standard for instant messaging,

A)Messages often have widely differing formats
B)Both IM participants typically have to use the same chat software
C)IM is generally not used for business purposes
D)An investigator may have to use a generic program to access messages
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
Of the following,which is NOT considered a Regional Internet Registry?

A)AfriNIC
B)APNIC
C)LATNIC
D)ARIN
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
E-mail attachments can be found within slack space by searching for

A)The keyword base64
B)The keyword base32
C)The keyword base16
D)The keyword base8
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT a webmail program?

A)Yahoo!Mail
B)Hotmail
C)LotusMail
D)Gmail
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
Which e-mail program comes with Microsoft Office?

A)Outlook
B)Outlook Express
C)Eudora
D)Office Notes
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
A person using webmail may be able to use a program such as ________ to connect to the server and thus download messages to work with offline.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
E-mail software is a(n)________ program that works in concert with a(n)________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
One of the challenges when trying to find webmail evidence is that

A)Webmail is more widely used than client programs
B)Webmail accounts are harder to access
C)Webmail accounts are easier to use
D)E-mails from webmail accounts are not typically stored on the user's computer
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
In Outlook Express,each e-mail account is given a Microsoft ________,which is a unique hexadecimal representation for that account.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
You can look in the ________ folder to find applications such as Eudora or Lotus Notes.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
E-mail client programs are generally configured to communicate with

A)One or more servers
B)One or more hosts
C)A single user account
D)Internet clients
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
________ uses two or more hard drives accessed in parallel to create a pool of storage.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
The tool often used for quick communications without resorting to e-mail is________ .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
According to many Americans,________ violate their privacy and their First Amendment rights.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)________ server resolves domain names to IP addresses.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Attachments are normally handled using a(n)_______ binary-to-text encoding scheme.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
Error-corrective coding (ECC),also known as ________,is used to check the validity of striped data.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
To handle attachments now being included in e-mail,________ ,a new standard,was introduced.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
The ________ comes before the @ sign in an e-mail address
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
________ is writing the same data in two places.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
A check of the ________ will determine how long a company keeps e-mails.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Match between columns
To
Used if sender requests an automated confirmation of the recipient having read the e-mail
To
Easily spoofed by hackers
To
Nonstandard heading sometimes used when encountering a mailing list
To
Deals with non-text items such as photos
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
First step
Server sends e-mail to final destination
First step
Client sends copy of e-mail to server
First step
User logs onto her e-mail account
First step
User initiates a send session via port 25
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.