Guide to Computer Forensics and Investigations 5th Edition By Bill Nelson Amelia Phillips Christopher Steuart – Test Bank
Matching
a. client server / architecture
b. Electronic Communications Privacy Act (ECPA)
c. Enhanced/Extended Simple Mail Transfer Protocol (ESMTP) d. Internet Message Access Protocol 4 (IMAP4)
e. mbox
f. Messaging Application Programming Interface (MAPI)
g. Multipurpose Internet Mail Extensions (MIME)
h. online social networks (OSNs)
i. pharming
j. phishing
QUESTION TYPE: Matching
HAS VARIABLES: False
DATE CREATED: 12/15/2014 10:20 PM
DATE MODIFIED: 12/15/2014 10:46 PM
1. A network architecture in which each computer or process on the network is a client or server. Clients request services from a server, and a server processes requests from clients.
ANSWER: a
POINTS: 1
2. A type of e-mail scam that’s typically sent as spam soliciting personal identity information that fraudsters can use for identity theft.
ANSWER: j
POINTS: 1
3. A protocol for retrieving e-mail messages; it’s slowly replacing POP3.
ANSWER: d
POINTS: 1
4. An enhancement of SMTP for sending and receiving e-mail messages. ESMTP generates a unique, nonrepeatable number that’s added to a transmitted e-mail. No two messages transmitted from an e-mail server have the same ESMTP value.
ANSWER: c
POINTS: 1
5. A type of e-mail scam that uses DNS poisoning to redirect readers to a fake
Web site.
ANSWER: i
POINTS: 1
6. A term researchers use for social media.
ANSWER: h
POINTS: 1
7. The Microsoft system that enables other e-mail applications to work with each other
ANSWER: f
POINTS: 1
8. A law enacted in 1986 to extend the Wiretap Act to cover e-mail and other data transmitted via the Internet.
ANSWER: b
POINTS: 1
9. A specification for formatting non-ASCII messages, such as graphics, audio, and video, for transmission over the Internet.
ANSWER: g
POINTS: 1
10. A method of storing e-mail messages in a flat plaintext file
ANSWER: e
POINTS: 1
Reviews
There are no reviews yet.