you are the it security administrator for a small corporate network. the company president has received several emails that he is wary of. he has asked you to determine whether they are hazardous and handle them accordingly.in this lab, your task is to perform the following: