Which of the following can be installed and configured …

Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?

Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?

A.
Kerberos

B.
Single sign-on (SSO)

C.
TCP/IP protocol

D.
Microsoft Forefront and Threat Management Gateway



Leave a Reply 0

Your email address will not be published. Required fields are marked *