Why are network router logs important during an e-mail investigation?

What will be an ideal response?


ANSWER: Network administrators maintain logs of the inbound and outbound traffic routers handle. Routers have rules to allow or deny traffic based on source or destination IP address. In most cases, a router is set up to track all traffic flowing through its ports. Using these logs, you can determine the path a transmitted e-mail has taken. The network administrator who manages routers can supply the log files you need. Review the router logs to find the victim’s (recipient’s) e-mail, and look for the unique ID number.

Computer Science & Information Technology

You might also like to view...

A ____ is the beginning of a final function that can be used as a placeholder for the final unit until the unit is completed.

a. declaration b. definition c. stub d. prototype

Computer Science & Information Technology

To create a caption for a Web page table, you may use the ____________________ element.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A RAID 1 array can be rebuilt if a single drive fails

Indicate whether the statement is true or false

Computer Science & Information Technology

If you select the ____________________ button on the Shapes options bar, the path becomes a path or work path on the Paths panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology