Ursula believes that many individuals in her organization are storing sensitive information on their laptops in a manner that is unsafe and potentially violates the organization's security policy. What control can she use to identify the presence of these files?

A. Network DLP
B. Network IPS
C. Endpoint DLP
D. Endpoint IPS

Answer: C. Endpoint DLP

Computer Science & Information Technology

You might also like to view...

Which of the following is/are valid C++ identifiers?

A) department_9 B) a Very Long Variable Name C) last-name D) All of the above. E) Both A and B, but not C.

Computer Science & Information Technology

What does a primary key do?

a. Identifies each row of a table. b. Selects a number of rows from a database. c. Stores a bunch of related data. d. None of the above.

Computer Science & Information Technology