CJUS 363 Quiz 4

CJUS 363 Quiz 4 Liberty University

Set 1

  1. Which e-mail recovery program below can recover files from VMware and VirtualPC virtual machines, as well as ISOs and other types of file backups?
  2. What service below can be used to map an IP address to a domain name, and then find the domain name’s ​point of contact?
  3. ​In older versions of exchange, what type of file was responsible for messages formatted with Messaging Application Programming Interface, and served as the database file?
  4. One of the most noteworthy e-mail scams was 419, otherwise known as the _______________.​
  5. An Internet e-mail server is generally part of a local network, and is maintained and managed by an administrator for internal use by a specific company.​
  6. ​How can routers be used to determine the path of an e-mail?
  7. Compare and contrast email services on Internet and an intranet.
  8. Describe the two different types of Facebook profiles.
  9. On a UNIX system​, where is a user’s mail stored by default?
  10. E-mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.​
  11. Where does the Postfix UNIX mail server store e-mail?​
  12. Similar to ARIN, the ____________ can be used to find a domain’s IP address and point of contact.​
  13. Committing crimes with e-mail is uncommon, and investigators are not generally tasked with linking suspects to e-mail.​
  14. ​In what state is sending unsolicited e-mail illegal?
  15. What type of Facebook profile is usually only given to law enforcement with a warrant?​
  16. In an e-mail address, everything before the @ symbol represents the domain name.​
  17. ​The ____________________ includes logging instructions and is located within the /etc It determines what happens to an e-mail when it is logged: the event, priority level, and the action taken.
  18. Which option below is the correct path to the sendmail configuration file?​
  19. Many web-based e-mail providers offer _______________ services, such as Yahoo! Messenger and Google Talk.
  20. What kind of files are created by Exchange while converting binary data to readable text in order to prevent loss of data?​
  21. ​Select the program below that can be used to analyze mail from Outlook, Thunderbird, and Eudora.
  22. What information is not typically included in an e-mail header?​
  23. The sysfile on a computer can contain message fragments from instant messaging applications.​
  24. ​The DomainKeys Identified Mail service is a way to verify the names of domains a message is flowing through and was developed as a way to cut down on spam.
  25. Syslog is generally configured to put all e-mail related log information into what file?​

Set 2

  1. E­mail administrators may make use of _________________, which overwrites a log file when it reaches a specified size or at the end of a specified time frame.
  2. Which e­mail recovery program below can recover files from VMware and VirtualPC virtual machines, as well as ISOs and other types of file backups?
  3. What information is not typically included in an e­mail header?
  4. What command below could be used on a UNIX system to help locate log directories?
  5. What service below can be used to map an IP address to a domain name, and then find the domain name’s point of contact?
  6. Compare and contrast email services on Internet and an intranet.
  7. Exchange uses an Exchange database and is based on the _______________________, which uses several files in different combinations to provide e­mail service.
  8. Syslog is generally configured to put all e­mail related log information into what file?
  9. In older versions of exchange, what type of file was responsible for messages formatted with Messaging Application Programming Interface, and served as the database file?
  10. On a UNIX system, where is a user’s mail stored by default?
  11. Many web­based e­mail providers offer _______________ services, such as Yahoo! Messenger and Google Talk.
  12. Exchange servers maintain message logs in the ________________ log file.
  13. Describe the two different types of Facebook profiles.
  14. Select the program below that can be used to analyze mail from Outlook, Thunderbird, and Eudora.
  15. The DomainKeys Identified Mail service is a way to verify the names of domains a message is flowing through and was developed as a way to cut down on spam.
  16. One of the most noteworthy e­mail scams was 419, otherwise known as the
  17. In an e­mail address, everything before the @ symbol represents the domain name.
  18. Committing crimes with e­mail is uncommon, and investigators are not generally tasked with linking suspects to e­mail.
  19. What kind of files are created by Exchange while converting binary data to readable text in order to prevent loss of data?
  20. Where does the Postfix UNIX mail server store e­mail?
  21. How can routers be used to determine the path of an e­mail?
  22. Which option below is the correct path to the sendmail configuration file?
  23. In what state is sending unsolicited e­mail illegal?
  24. The _______________ utility can be used to repair .ost and .pst files, and is included with Microsoft Outlook.
  25. The sys file on a computer can contain message fragments from instant messaging applications.
$2.99
Buy Answer Key

has been added to your cart!

have been added to your cart!

Files Included - Liberty University
  1. CJUS 363 Quiz 4
  2. CJUS 363 Quiz 4 Set 2