Bryan has a set of sensitive documents that he would like to protect from public disclosure. He would like to use a control that, if the documents appear in a public forum, may be used to trace the leak back to the person who was originally given the document copy. What security control would best fulfill this purpose?

A. Digital signature
B. Document staining
C. Hashing
D. Watermarking

Answer; D. Watermarking

Computer Science & Information Technology

You might also like to view...

All the following are security features included within the system's typical BIOS dialog menus except ________?

a. BIOS password b. Power-On password c. Advanced BIOS security lock d. Boot sector password

Computer Science & Information Technology

System access threats fall into two general categories: intruders and ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology