A Chief Information Security Officer (CISO) is concerned the development team, which consists of contractors, has too much access to customer data. Developers use personal workstations, giving the company little to no visibility into the development activities. Which of the following would be BEST to implement to alleviate the CISO's concern?

A. DLP
B. Encryption
C. Test data
D. NDA


Ans: C. Test data

Computer Science & Information Technology

You might also like to view...

What is wrong with the following function body?

void calculate(int count, float price, float& cost) { if (count < 0) cost=0.0; else cost=count*price; return; } a. void functions may not have a return statement. b. void functions must return a value c. nothing d. can not mix reference and value parameters

Computer Science & Information Technology

Which of the following are correct? Why are the others incorrect?

When a function having an array formal parameter is called, the formal array parameter … a) names a copy of the array argument. b) refers to exactly the same array as the calling program c) is passed the address of the argument, and the function needs further information about the array size to safely use an array parameter d) refers to the array using a name that is always different from the calling program's argument.

Computer Science & Information Technology

Phil has been asked to give a report on a trip that he and members of his Art Appreciation Club took to Italy. To do this, he will use his Mac computer to develop a slide show.After choosing and opening the  program, Phil can select from a group of ____ that provide predesigned formatting, text, and other presentation tools.

A. templates B. layouts C. icons D. worksheets

Computer Science & Information Technology

Which of the following problems is most suitable to be solved using recursion?

A. binary search B. initializing an array with zeros (0) C. displaying a text menu to the user D. randomly shuffling a deck of cards

Computer Science & Information Technology