Hearsay Rule 1003: Admissibility of Duplicates Limited admissibility Locard’s Principle admin See author's posts Post navigation dam, a forensic investigator, is investigating an attack on Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine? When a user deletes a file or folder, the system stores complete path including the original filename in a special hidden file called “INFO2” in the Recycled folder. If the INFO2 file is deleted, it is recovered when you ________.