A. antivirus (full AV, express AV) B. antivirus (desktop AV) C. Web filtering D. antispam E. firewall user authentication
A. It can drop the connection at the IP address level B. It can block the e-mail based upon the sender ID C. It can allow the e-mail and bypass all UTM inspection D. It can allow the e-mail to be forwarded, but change the intended recipient to a new e-mail address E. It can allow the e-mail to be forwarded to the destination, but tag it with a custom value in the subject line
A. An individual policy can have only one scheduler applied. B. You must manually configure system-time updates. C. Multiple policies can use the same scheduler. D. Policies that do not have schedulers are not active.