Which of the following can be installed and configured to prevent suspicious emails from entering
the user’s network?
A.
Kerberos
B.
Single sign-on (SSO)
C.
TCP/IP protocol
D.
Microsoft Forefront and Threat Management Gateway
Explanation:
To prevent suspicious emails from entering the network, it is required to install Microsoft Forefront
and Threat Management Gateway and configure it so that it can block any malicious emails.
Exchange server has many spam filtering tools but Forefront and TMG are additional security
measures used for enhancing the protection of the system.
authentication and authorization is used to allow a user to access all computers and systems where
he got a access permission, without entering passwords for multiple times.
a service in a computer network.
for communicating with each other over the internet.