Which of the following network protocols can be inspected by the Data Leak Prevention scanning? (Choose three.)
A. SMTP
B. HTTP-POST
C. AIM
D. MAPI
E. ICQ
Which of the following network protocols can be inspected by the Data Leak Prevention scanning? (Choose three.)
A. SMTP
B. HTTP-POST
C. AIM
D. MAPI
E. ICQ