Once an investigator has isolated the IP addresses and timestamps in the full header of an email, the next step is to verify who is responsible for that IP address. This is done using a _________________ query
a. IPTrace
b. IP Lookup
c. WHOIS
d. WYSIWG
e. PEBCAK
A
You might also like to view...
According to FBI data, which of the following is NOT True about homicide?
A. The percent of homicide committed by family members has declined since the 1960s. B. The percent of stranger killing has remained fairly stable since the late seventies. C. The percent of stranger crimes has steadily increased since the 1960s. D. Homicide in which the victim-offender relationship is unknown increased greatly since the 1960s.
Hate violence has a long history in the United States and some sources suggest that it has increased in the recent past
a. True b. False Indicate whether the statement is true or false
Which of the following theories is an exception to the tendency of scholars to ignore existing theories when developing new perspectives on gangs and delinquency?
a. conflict theory b. self-control theory c. strain theory d. social disorganization theory
The Bill of Rights has been completely incorporated and applied to the states
a. True b. False Indicate whether the statement is true or false