Implementing content filtering and intrusion detection/intrusion prevention systems at the Internet ingress/egress as well as disabling system administration rights on user workstations are strategies that can be used for preventing users from:_______

a. downloading and installing unauthorized applications and software onto organization-owned IT assets.
b. inserting CDs, DVDs, and USB drives with personal data onto organization-owned IT assets.
c. accessing the Internet and surfing the Web.
d. clicking on unknown e-mail attachments and files.