Which of the following can be installed and configured to prevent suspicious emails from entering th seenagape 12 years ago Which of the following can be installed and configured to prevent suspicious emails from entering the user’s network? A.Kerberos B.Single sign-on (SSO) C.TCP/IP protocol D.Microsoft Forefront and Threat Management Gateway ← Previous question Next question →