Ursula believes that many individuals in her organization are storing sensitive information on their laptops in a manner that is unsafe and potentially violates the organization's security policy. What control can she use to identify the presence of these files?
A. Network DLP
B. Network IPS
C. Endpoint DLP
D. Endpoint IPS
Answer: C. Endpoint DLP
Computer Science & Information Technology
You might also like to view...
Which of the following is/are valid C++ identifiers?
A) department_9 B) a Very Long Variable Name C) last-name D) All of the above. E) Both A and B, but not C.
Computer Science & Information Technology
What does a primary key do?
a. Identifies each row of a table. b. Selects a number of rows from a database. c. Stores a bunch of related data. d. None of the above.
Computer Science & Information Technology