What is required to conduct an investigation involving e-mail abuse?
What will be an ideal response?
ANSWER: The following list is what you need for an investigation involving e-mail abuse:
* An electronic copy of the offending e-mail that contains message header data; consult with your e-mail server administrator
* If available, e-mail server log records; consult with your e-mail server administrator to see whether they are available
* For e-mail systems that store users’ messages on a central server, access to the server; consult with your e-mail server administrator
* For e-mail systems that store users’ messages on a computer as an Outlook .pst or .ost file, for example, access to the computer so that you can perform a forensic analysis on it
* Your preferred computer forensics analysis tool, such as Forensic Toolkit or ProDiscover
You might also like to view...
Draw a hat on someone in a picture.
What will be an ideal response?
To create an InputStream to read from a file on a Web server, you use the method __________ in the URL class.
a. getInputStream(); b. obtainInputStream(); c. openStream(); d. connectStream();
_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
A. Accessibility B. Relationship C. Feasibility D. Performance
Writing code so that an operator can be used with variables of programmer defined types is called __________________.
Fill in the blank(s) with the appropriate word(s).