A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
A. DLP
B. AUP
C. NDA
D. SLA
Answer: A. DLP
Computer Science & Information Technology
You might also like to view...
In a mail merge, the ________ contains the variable information, such as specific client and company names
A) data source B) main document C) works cited page D) header and footer
Computer Science & Information Technology
____ software identifies malware that tries to install on your computer or device.
A. Antivirus B. Firewall C. Electronic wallet D. Digital certificate
Computer Science & Information Technology