The IT department has been tasked with reducing the risk of sensitive information being shared with unauthorized entities from computers it is saved on, without impeding the ability of the employees to access the internet. Implementing which of the following would be the best way to accomplish this objective?

A. Host-based firewalls
B. DLP
C. URL filtering
D. Pop-up blockers

Answer: B. DLP

Computer Science & Information Technology

You might also like to view...

The Windows 8.1 file setupact.log ___________

a. Records information about the user directory structure, including security identifiers (SIDs) b. Records modifications performed on the system during Setup c. Records data about Plug and Play devices and drivers. Check this file for device driver installation information d. Logs the security settings for the computer

Computer Science & Information Technology

Context-sensitive help opens the Help topic related to the feature being used.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology