Which of the following controls is MOST effective in detecting spam?
A. Denying transmission control protocol (TCP) connections in the mail server
B. Refusing Internet protocol (IP) connections at the router
C. Registering the recipient with keepers of spam lists
D. Using heuristic filters based on the content of the message
A. Denying transmission control protocol (TCP) connections in the mail server
B. Refusing Internet protocol (IP) connections at the router
C. Registering the recipient with keepers of spam lists
D. Using heuristic filters based on the content of the message