A data loss prevention strategy would MOST likely incorporate which of the following to reduce the risk associated with data loss?

A. Enforced privacy policy, encryption of VPN connections, and monitoring of communications entering the organization.
B. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications leaving the organization.
C. Enforced privacy policy, encryption of VPN connections, and monitoring of communications leaving the organization.
D. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications entering the organization.


Answer: B. Enforced acceptable usage policy, encryption of confidential emails, and monitoring of communications leaving the organization.

Computer Science & Information Technology

You might also like to view...

Indicate whether statement is valid, refer to the declarations and initializations below. If the statement is valid, indicate what value is displayed or assigned. If the statement is invalid, explain why.

``` double x[8] = {16.0, 12.0, 6.0, 8.0, 2.5, 12.0, 14.0, -54.5}; int j = 5; ``` printf("%.2f\n", x[j + 1]);

Computer Science & Information Technology

________ is a platform of collaboration software based on a server, which allows people in a business or enterprise to set up websites to share information, and publish and manage documents and reports

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is used to allocate memory for the instance variables of an object of a class?

A. the reserved word public B. the reserved word static C. the operator new D. the operator +

Computer Science & Information Technology

You can move through states in the History panel by ____.

a. pressing CRTL+SHIFT+Z b. clicking them c. pressing CRTL+ALT+Z d. all of the above

Computer Science & Information Technology