How are virus and Trojan Horse attacks mitigated in the SAFE SMR midsize network design
corporate Internet module?
A.
IDS at the host and network levels
B.
mail content filtering, HIDS, and host-based virus scanning
C.
OS and IDS detection
D.
RFC 2827 and 1918 filtering at ISP edge and midsize network edge router
E.
CAR at the ISP edge and TCP setup controls at the firewall
F.
filtering at the ISP, edge router, and corporate firewall