Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?

Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?

Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?

A.
Kerberos

B.
Single sign-on (SSO)

C.
TCP/IP protocol

D.
Microsoft Forefront and Threat Management Gateway



Leave a Reply 0

Your email address will not be published. Required fields are marked *