An organization using instant messaging to communicate with customers can prevent legitimate customers from being impersonated by:
A. using call monitoring.
B. using firewalls to limit network traffic to authorized ports.
C. logging conversations.
D. authenticating users before conversations are initiated.
A. using call monitoring.
B. using firewalls to limit network traffic to authorized ports.
C. logging conversations.
D. authenticating users before conversations are initiated.