Q. Which one of the following statements is correct about Email security in the network security methods?
A. One has to deploy hardware, software, and security procedures to lock those apps down.
B. One should know about what the normal behavior of a network look likes so that he/she can spot any changes, breaches in the behavior of the network.
C. Phishing is one of the most commonly used methods that are used by hackers to gain access to the network
D. All of the above
Answer: Phishing is one of the most commonly used methods that are used by hackers to gain access to the network