Which of the following would be used to detect and prevent unauthorized transmission of confidential information?
a. Change management
b. Auditing
c. Incident management
d. Data-loss prevention
Answer: d. Data-loss prevention
Computer Science & Information Technology
You might also like to view...
The default line spacing for a table is the same as for a document
Indicate whether the statement is true or false
Computer Science & Information Technology
An outside class cannot call an overridable procedure in the subclass.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology