A.reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via email
B.determines if A user or device is authorized to access A switch port
C.defends the penmeter from malicious users and unauthorized traffic
D.provides A secure communication path through the internet