1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Orlov [11]
3 years ago
5

You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,

the company is preparing a series of short presentations for local middle school students. The topics address how e-mail works and the types of information forensic e-mail investigations attempt to uncover.
To prepare for your presentation, answer the following questions so that you can address them with middle school students during your talk:

1. To trace an e-mail, what part of an e-mail do you examine?
2. Which command(s) would you use?
3. What tools or websites can you use to determine ownership of an e-mail?
4. What tools would you use to explore e-mail on a server?
5. What types of files should you examine on a server?
6. What challenges do you think you would encounter when examining e-mail on a server?
Computers and Technology
1 answer:
kirill [66]3 years ago
8 0

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

You might be interested in
How to get the blade out of a pencil sharpener?
agasfer [191]
Poke hole with thin but strong object
Or buy new sharpener
7 0
4 years ago
Answer: x = 3<br>#1 -2x + 5 = -31​
OLga [1]
#1 answer:X=-18
Mdkdkkdkdkdkkdkdkdk
3 0
3 years ago
Explain how data is represent in the computer system
Alex Ar [27]

Explanation:

<h3>Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.</h3>

7 0
3 years ago
Is there any app that understands fake photos<br><br><br>help me i need to know it​
Lapatulllka [165]

Answer:

Tineye Image Recognition. This app allows users to upload a picture or a URL to trace where else it appears online. ...

Reversee. This app stays true to its name. ...

Camfind. ...

Reverse Image Search.

7 0
3 years ago
Read 2 more answers
The class decided against learning new course material because they wanted to _____ the material that would be on their final ex
evablogger [386]

Answer:

ace, learn, memorize, comprehend

Explanation:

6 0
3 years ago
Other questions:
  • If a method writes to a file it should start out like (fill out the blank, what should you write after the parameters in the met
    12·1 answer
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    7·2 answers
  • Can your computer become infected with a virus via email
    6·1 answer
  • Consider the following page reference string:
    12·1 answer
  • And computers are the most commonly seen microcomputers.
    10·1 answer
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • Question #2
    6·2 answers
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • Text me on instagram forever.brazy so we can watch a movie​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!