Bryan has a set of sensitive documents that he would like to protect from public disclosure. He would like to use a control that, if the documents appear in a public forum, may be used to trace the leak back to the person who was originally given the document copy. What security control would best fulfill this purpose?
A. Digital signature
B. Document staining
C. Hashing
D. Watermarking
Answer; D. Watermarking
Computer Science & Information Technology
You might also like to view...
All the following are security features included within the system's typical BIOS dialog menus except ________?
a. BIOS password b. Power-On password c. Advanced BIOS security lock d. Boot sector password
Computer Science & Information Technology
System access threats fall into two general categories: intruders and ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology