Which of the following would be used to detect and prevent unauthorized transmission of confidential information?

a. Change management
b. Auditing
c. Incident management
d. Data-loss prevention

Answer: d. Data-loss prevention

Computer Science & Information Technology

You might also like to view...

The default line spacing for a table is the same as for a document

Indicate whether the statement is true or false

Computer Science & Information Technology

An outside class cannot call an overridable procedure in the subclass.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology