37. While reviewing the security logs for your server, you notice that a user on the internet has attempted to access

your internal mail server. Although it appears that the user’s attempts were unsuccessful you are still very
concerned about the possibility that your systems may be compromised. Which of the following solutions are you
most likely to implement?
A. A firewall system all the connection point to the internet
B. A more secure password policy
C. File-level encryption
D. Kerberos authentication�

A. A firewall system all the connection point to the internet

This solution would help to prevent unauthorized access to the internal mail server by blocking any incoming connections from the internet that are not explicitly allowed through the firewall. This would help to enhance the overall security of the server and reduce the risk of potential compromise.