Why are network router logs important during an e-mail investigation?
What will be an ideal response?
ANSWER: Network administrators maintain logs of the inbound and outbound traffic routers handle. Routers have rules to allow or deny traffic based on source or destination IP address. In most cases, a router is set up to track all traffic flowing through its ports. Using these logs, you can determine the path a transmitted e-mail has taken. The network administrator who manages routers can supply the log files you need. Review the router logs to find the victim’s (recipient’s) e-mail, and look for the unique ID number.
You might also like to view...
A ____ is the beginning of a final function that can be used as a placeholder for the final unit until the unit is completed.
a. declaration b. definition c. stub d. prototype
To create a caption for a Web page table, you may use the ____________________ element.
Fill in the blank(s) with the appropriate word(s).
A RAID 1 array can be rebuilt if a single drive fails
Indicate whether the statement is true or false
If you select the ____________________ button on the Shapes options bar, the path becomes a path or work path on the Paths panel.
Fill in the blank(s) with the appropriate word(s).