Once an investigator has isolated the IP addresses and timestamps in the full header of an email, the next step is to verify who is responsible for that IP address. This is done using a _________________ query

a. IPTrace
b. IP Lookup
c. WHOIS
d. WYSIWG
e. PEBCAK


A

Criminal Justice

You might also like to view...

According to FBI data, which of the following is NOT True about homicide?

A. The percent of homicide committed by family members has declined since the 1960s. B. The percent of stranger killing has remained fairly stable since the late seventies. C. The percent of stranger crimes has steadily increased since the 1960s. D. Homicide in which the victim-offender relationship is unknown increased greatly since the 1960s.

Criminal Justice

Hate violence has a long history in the United States and some sources suggest that it has increased in the recent past

a. True b. False Indicate whether the statement is true or false

Criminal Justice

Which of the following theories is an exception to the tendency of scholars to ignore existing theories when developing new perspectives on gangs and delinquency?

a. conflict theory b. self-control theory c. strain theory d. social disorganization theory

Criminal Justice

The Bill of Rights has been completely incorporated and applied to the states

a. True b. False Indicate whether the statement is true or false

Criminal Justice