kayleeclayton2948 kayleeclayton2948 09-02-2024 Computers and Technology contestada Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used in email to verify the identity of the sender?a) Firewallb) Intrusion Detection System (IDS)c) Encryptiond) Digital signatures