Respond to Social EngineeringYou work as the IT security administrator for a small corporate network. The company president has received several emails that he is wary of. He has asked you to determine whether they are hazardous and handle them accordingly.In this lab, your task is to perform the following:• Read each email and determine if it is legitimate.• Delete any emails that are attempts at social engineering.• Keep any emails that are safe.Hold your mouse over the embedded links to see the actual URL in the status bar at the bottom of the screen.