List of questions
Related questions
Question 372 - 312-49v10 discussion
Adam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution.
Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?
A.
PRIV.STM
B.
gwcheck.db
C.
PRIV.EDB
D.
PUB.EDB
Your answer:
0 comments
Sorted by
Leave a comment first