Describe the process of examining e-mail messages when you have access to the victim’s computer and when this access is not possible.
What will be an ideal response?
ANSWER: After you have determined that a crime has been committed involving e-mail, access the victim’s computer or mobile device to recover the evidence on it. Using the victim’s e-mail client, find and copy any potential evidence. It might be necessary to log on to the e-mail service and access any protected or encrypted files or folders. If you can’t actually sit down at the victim’s computer, you might have to guide the victim on the phone to open and print a copy of an offending message, including the header. The header contains unique identifying numbers, such as the IP address of the server that sent the message. This information helps you trace the e-mail to the suspect.
You might also like to view...
Which of the following is the method used to display a dialog box to gather input?
a. showMessageDialog. b. getInput. c. inputDialog. d. showInputDialog.
A reference is
a. an alias for another variable b. a pointer c. the name of a storage location d. approximate self dereferencing constant pointer e. if standalone, can be much trouble
Unstructured Web sites can be difficult and frustrating to use.
Answer the following statement true (T) or false (F)
Analysts often refer to the three ____'s when describing characteristics of Big Data.
A. C B. G C. D D. V