Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?
A.
Kerberos
B.
Single sign-on (SSO)
C.
TCP/IP protocol
D.
Microsoft Forefront and Threat Management Gateway
Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?
Which of the following can be installed and configured to prevent suspicious emails from entering the
user’s network?
A.
Kerberos
B.
Single sign-on (SSO)
C.
TCP/IP protocol
D.
Microsoft Forefront and Threat Management Gateway