You are a computer forensics investigator working with local police department and you are called
to assist in an investigation of threatening emails. The complainant has printer out 27 email
messages from the suspect and gives the printouts to you. You inform her that you will need to
examine her computer because you need access to the ______________ in order to track the
emails back to the suspect.
A.
Routing Table
B.
Firewall log
C.
Configuration files
D.
Email Header