The IT department has been tasked with reducing the risk of sensitive information being shared with unauthorized entities from computers it is saved on, without impeding the ability of the employees to access the internet. Implementing which of the following would be the best way to accomplish this objective?

A. Host-based firewalls
B. DLP
C. URL filtering
D. Pop-up blockers


Answer: B. DLP

Computer Science & Information Technology

You might also like to view...

A String constructor cannot be passed ________.

a. char arrays. b. int arrays. c. byte arrays. d. Strings.

Computer Science & Information Technology

Borders and background colors define areas of a worksheet and call attention to important information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?Identify the letters of the choices that best match the phrases or definitions.

A. ?This operator negates any features found in an expression. B. ?This property has no impact when items are flexed to fill the entire given space. C. ?This is provided by mobile phone companies for developers to use to test their programs and websites. D. ?The best way to test this is to view it directly on a mobile device. E. ?While designing websites for mobile devices, these need to be easily accessed via a touch interface. F. It arranges multiple lines of content along a flexbox's cross axis.? G. ?This determines the properties of the device rendering a website page so that appropriate designs can be delivered to specific devices. H. ?It defines the initial size of a flex item before a browser attempts to fit it to a flexbox. I. ?It formats the printed version of a web document. J. ?The number of colors supported by an output device. K. ?It is used to create an inflexible item that will not grow or shrink. L. ?This media type is used for mobile devices with small screens and limited bandwidth.

Computer Science & Information Technology

Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful attempts to enter his password, he asks you to reset the password because he must have forgotten it. You reset his password, and he types it, but again the computer rejects it. Jose assures you that he typed the correct user name and password. You ask him what type of computer he is using, and he tells you a laptop.    What might be the problem with Jose’s computer?

A. Keyboard is not working. B. OS is corrupt. C. Keyboard is in the wrong language. D. Num Lock key is on.

Computer Science & Information Technology