Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
59 views7 pages

Email Forensics Riddles

This document contains poetic riddles which anyone interested can use for the purposes of revision or even fun.

Uploaded by

attastudy7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views7 pages

Email Forensics Riddles

This document contains poetic riddles which anyone interested can use for the purposes of revision or even fun.

Uploaded by

attastudy7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 7

1. I reveal the tracks left in bytes and logs, clues hidden in files like digital fogs. What am I?

Answer: Digital Forensics

2. I hide the source of a cyber attack, but with a little trace, I get found back. What am I?

Answer: IP address (from email headers)

3. I am the part of the email with invisible proof, that shows where it's been, aloof from the spoof. What
am I?

Answer: Email header

4. I store the time, date, and sender's place, a key to unlock a cyber chase. What part of an email am I?

Answer: Date and time in the email header

5. I carry the sender’s address and more, revealing the one who opened the door. What part of an email
am I?

Answer: From field (sender email address)

6. With X in my name, I trace the start, showing where the email began its part. What part of the header
am I?

Answer: X-Originating-IP

7. I'm the body, not just the face, holding text, links, and an attached case. What part of an email am I?

Answer: Email body

8. I’m the tool used to recover lost files, from devices hacked with ill-gotten wiles. What am I?

Answer: Data recovery software


9. I carry the path where data flows, revealing email servers and where it goes. What part of an email am
I?

Answer: Email relay (SMTP servers)

10. I am the real sender, hiding within, but email forensics will reveal my sin. What am I?

Answer: Spoofed sender email

11. I hold attachments, plain text, and more, with the evidence you’re looking for. What part of the email
am I?

Answer: Email body

12. I show who’s meant to receive the mail, listed along with sender's trail. What part of the header am
I?

Answer: To field (recipient email)

13. When spoofers try to fake and play, I show the true sender's way. What part of the email am I?

Answer: Return-Path (Reply-To)

14. I scan devices from start to end, collecting evidence to help defend. What am I?

Answer: Digital forensic investigation tool

15. Hidden deep inside every mail, I reveal fraudsters without fail. What part of the email am I?

Answer: Email header

16. I record logs of every move, showing what the attacker had to prove. What am I?

Answer: Log file


17. I'm a time marker in digital space, showing when events took their place. What am I?

Answer: Timestamp

18. I help recover data from a broken drive, bringing back what hackers strive to hide. What tool am I?

Answer: Data recovery tool

19. I track emails from server to server, revealing what spammers try to cover. What am I?

Answer: Email header analysis

20. I carry secrets in plain sight, my metadata shows the fight. What am I?

Answer: Email metadata

21. I store passwords, browsing logs, and more, revealing the hacker’s score. What am I?

Answer: Browser cache

22. I help you find where an email starts, tracing it back like forensic arts. What am I?

Answer: Email trace

23. I show the domain where the email was sent, revealing the scammer's intent. What part of the email
am I?

Answer: Smtp.mailfrom/header.From

24. I search for hidden text and clues, revealing what the email wants you to use. What tool am I?

Answer: Email forensics tool

25. I analyze email headers for phishing attacks, revealing where the real truth cracks. What am I?
Answer: Email header analysis

26. I reveal the location of the sender’s IP, giving the investigator the key. What am I?

Answer: Reverse IP lookup

27. I show emails in plain or coded form, but my format can cause a storm. What am I?

Answer: Email encoding format

28. I investigate systems, files, and disks, collecting data and minimizing risks. What am I?

Answer: Digital forensic investigator

29. I protect your device from harm and attack, but forensics can find what hackers lack. What am I?

Answer: Antivirus software

30. I show where the email was received, the final stop where the case is believed. What am I?

Answer: Recipient’s IP address

31. I reveal who sent the email fraud, exposing the one who played God. What part of the email am I?

Answer: From field (sender's email)

32. I am a forensic analysis to find the fault, used to crack down on cyber assault. What am I?

Answer: Cyber forensics

33. I hide in attachments, malware too, but forensics will reveal my due. What am I?

Answer: Malicious attachment


34. I dig through servers, logs, and more, tracing emails from source to core. What am I?

Answer: Email server log analysis

35. I carry the signature of sender and time, helping investigators solve the crime. What part of the email
am I?

Answer: Digital signature

36. I analyze emails and track their way, finding clues in the words they say. What tool am I?

Answer: Email analysis tool

37. I store secrets that I won't tell, unless forensics breaks my shell. What am I?

Answer: Encrypted data

38. I track where emails go and stop, showing servers until they drop. What am I?

Answer: Email relay chain

39. I show the trail of emails received, with every step to be believed. What part of the header am I?

Answer: Received field

40. I reveal the hidden IP of the sender, giving clues for a digital defender. What part of the email am I?

Answer: X-Originating-IP

41. I help analyze emails, fake or true, revealing details from sender to you. What tool am I?

Answer: Email forensics software


42. I store deleted files in hidden space, forensics will uncover every trace. What am I?

Answer: Deleted file recovery

43. I carry the email’s source and path, showing clues in digital wrath. What am I?

Answer: Email header

44. I crack open files that once were lost, revealing secrets at any cost. What am I?

Answer: File recovery tool

45. I reveal who a phishing email may claim, but my analysis shows the game. What am I?

Answer: Phishing email analysis

46. I check the email to see if it’s true, verifying if it was really sent to you. What am I?

Answer: Email authentication

47. I scan the headers and dig for clues, exposing scammers who misuse. What tool am I?

Answer: Email header analyzer

48. I track the source of spam and lies, exposing the one who hides in disguise. What am I?

Answer: Email forensics

49. I search for clues in email time stamps, tracing back the criminal's tramps. What am I?

Answer: Timestamp analysis

50. I recover emails lost to time, uncovering evidence in a cybercrime. What am I?


Answer: Email recovery tool

You might also like