A. It is the lock on the door for networks and computer systems.
B. It is effective against all vulnerabilities in networks and computer systems.
C. It blocks malicious activity in networks and computer systems.
D. It detects attempts to break into or misuse a computer system.