Which of the following computing techniques will limit the vulnerability of a system to infection by a virus? (Select TWO).
A.
Install a NAT firewall on the network
B.
Run an online malware scan monthly
C.
Only open email from recognized senders
D.
Update antivirus signatures on a daily basis
E.
Automatically update the operating system