A security technician is attempting to improve the overall security posture of an internal mail
server. Which of the following actions would BEST accomplish this goal?
A.
Monitoring event logs daily
B.
Disabling unnecessary services
C.
Deploying a content filter on the network
D.
Deploy an IDS on the network