Linux Log Management
Resource Monitoring
Email Forensic Artifacts
Investigative Steps & Tools
Final Jepordy
100

This central directory is where most Linux log files, such as boot.log and messages, are stored.

What is /var/log?

100

This simple command displays the current time, how long the system has been up, and the load average.

What is uptime?

100

In Microsoft Outlook, local email data for POP accounts is typically stored in this file format.

What is .pst (Personal Storage Table)?

100

This is the first critical step in an email crime investigation, which requires a search warrant.

What is seizing the computer and email accounts?

200

This utility is run automatically by the cron daemon to back up log files and delete old backups to save space.

What is logrotate?

200

This virtual file contains detailed technical information about the CPU, including model name and cache size.

What is /proc/cpuinfo?

200

This part of an email message holds vital origin information and cannot be easily forged in its "Received" entries.

What is the bottommost Received header?

200

This scanning tool in the CentralOps.net suite provides MX records and initiates SMTP sessions to check address validity.

What is Email Dossier?

300

On modern systemd-based distributions, this command is used to view and filter the system journal.

What is journalctl?

300

A "load average" of 1.0 on a single-core system indicates this specific state of CPU utilization.

What is Full load (100% utilization)?

300

This specific header field acts as the "bounce address" for undeliverable mail; if it differs from the "From" address, it often indicates spoofing.

What is the Return-Path?

300

This forensic tool is used to recover and collect deleted email messages from Outlook .pst files.

What is Paraben’s Electronic Evidence Examiner?

300

Email Authentication 

This DNS-based process enables organizations to list the specific servers authorized to send emails on behalf of their domains.

What is SPF (Sender Policy Framework)?

400

To monitor a text-based log file in real-time as new entries are added, you would use this command with the -f flag.

What is tail -f?

400

This powerful tool provides a cumulative overview of CPU, Memory, and I/O usage, gathering data via cron.

What is sar (System Activity Report)?

400

This cryptographic signature allows a recipient to verify that an email actually originated from the claimed domain and hasn't been modified.

What is DKIM (DomainKeys Identified Mail)?

400

If a Message-ID shows this as the FQDN instead of a mail server, it clearly indicates a spoofed email.  

What is localhost?

500

This specific configuration file in /etc/ is used to define global log rotation settings, though it can be superseded by files in a sub-directory.

What is /etc/logrotate.conf?

500

This tool is used to view or configure Linux kernel parameters at runtime to optimize system performance.

What is sysctl?

500

If a suspect uses an IMAP account in Outlook, their local mailbox data will be stored in this specific file type.

What is .ost (Offline Storage Table)?

500

Email messages deleted from this specific Outlook folder can still be recovered if the unallocated space is not overwritten.

What is the Deleted Items folder?

M
e
n
u