Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?
A.
Kerberos
B.
Single sign-on (SSO)
C.
TCP/IP protocol
D.
Microsoft Forefront and Threat Management Gateway
Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?
Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network?
A.
Kerberos
B.
Single sign-on (SSO)
C.
TCP/IP protocol
D.
Microsoft Forefront and Threat Management Gateway