Refer to the exhibit.
An engineer is analyzing a .LNK (shortcut) file recently received as an email attachment and blocked by email security as suspicious.
What is the next step an engineer should take?
Click on the arrows to vote for the correct answer
A. B. C. D.D.