Explain how to handle attachments during an e-mail investigation.

What will be an ideal response?


ANSWER: An attachment can be any type of file, from a program to a picture. If a message includes an attachment, investigate it as a supporting piece of evidence. If you’re working with the victim, the attachment is usually still attached to the e-mail. If you’re investigating a suspect’s computer, remember to work with the copied version. On a suspect’s computer or forensic image, search for the attached file with a forensics tool or the OS’s Search or Find feature to determine whether the file was saved and still exists on the drive.

If you’re investigating an e-mail attachment with an unfamiliar file extension, such as .mdf, you can search the Internet to find out what program creates a file of this type.

Computer Science & Information Technology

You might also like to view...

USB flash drives plug into a computer's ____________________, a rectangle socket positioned on the front, side, or back of the system unit.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ is the set of computer programs that allows the hardware to perform different tasks

Fill in the blank(s) with correct word

Computer Science & Information Technology

For best results in presentations, Microsoft recommends use of modern media formats such as Advanced Audio Coding (AAC)

What will be an ideal response?

Computer Science & Information Technology

Images that are no longer protected by copyright law are in the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology