MeowieMeowMeow5159 MeowieMeowMeow5159 08-02-2024 Computers and Technology contestada A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing? A. Multifactor authentication B. Single sign-on C. RADIUS D. VPN