A security analyst inspects the header of an email that is presumed to be malicious and sees the following:
Which of the following is inconsistent with the rest of the header and should be treated as suspicious?
A. The use of a TLS cipher
B. The sender's email address
C. The destination email server
D. The subject line
Which of the following is inconsistent with the rest of the header and should be treated as suspicious?
A. The use of a TLS cipher
B. The sender's email address
C. The destination email server
D. The subject line