A. Minimizes the risk of external threats by blocking access to highrisk sites and external users
B. Minimizes the risk of external threats by blocking accessed to the internet
C. Minimizes the risk of external threats by blocking access to all internal resources
D. Minimizes the risks of external threats by blocking access to services and ports