A. By installing anti-spam software
B. By using a firewall
C. By setting up a WAN
D. By encrypting all data store in the system
A. By installing anti-spam software
B. By using a firewall
C. By setting up a WAN
D. By encrypting all data store in the system