Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used in email to verify the identity of the sender?
a) Firewall
b) Intrusion Detection System (IDS)
c) Encryption
d) Digital signatures