The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using

A) an information rights management software.
B) a data loss prevention software.
C) a digital watermark.
D) a stop leak software.

Answer: C

Business

You might also like to view...

The U.S. Constitution created these branches of the federal government: (1) executive, (2) judicial, and (3):

a. senatorial b. administrative c. legislative d. constitutional e. states

Business

Perhaps the simplest method of resolving a contractual disagreement involves straightforward, face-to-face negotiation between the two parties involved

a. True b. False Indicate whether the statement is true or false

Business