A. Examines each message as it seeks entrance to the network
B. Blocks messages without the correct markings from entering the network
C. Detects computers communicating with the Internet without approval
D. All of the above
Answer: Option D