A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

A. DLP
B. AUP
C. NDA
D. SLA

Answer: A. DLP

Computer Science & Information Technology

You might also like to view...

In a mail merge, the ________ contains the variable information, such as specific client and company names

A) data source B) main document C) works cited page D) header and footer

Computer Science & Information Technology

____ software identifies malware that tries to install on your computer or device.

A. Antivirus B. Firewall C. Electronic wallet D. Digital certificate

Computer Science & Information Technology