Adam works as a professional Computer Hacking Forensic Investigator. He wants to investigate a suspicious email that is sent using a Microsoft Exchange server. Which of the following files will he review to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
Odette
4 months agoMarg
4 months agoCallie
4 months agoSanjuana
4 months agoLawanda
5 months agoCelestina
5 months agoSarah
5 months agoJesusa
5 months agoGilberto
5 months agoDelsie
5 months agoYuonne
5 months ago