Looking for trustworthy answers? Westonci.ca is the ultimate Q&A platform where experts share their knowledge on various topics. Experience the convenience of finding accurate answers to your questions from knowledgeable experts on our platform. Get quick and reliable solutions to your questions from a community of experienced experts on our platform.

You’re investigating a case involving an employee who’s allegedly sent inappropriate photos via email in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk, you find a file named Xyz.zip, which you suspect is a graphics file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. In addition, you find some files with unfamiliar extensions and password‐protected files. Answer the following questions based on this scenario.
Explain how to trace, recover, and analyse e‐mail messages. (2.5 Marks)