A company is trying to limit the risk associated with the use of unapproved USB devices to copy documents. Which of the following would be the BEST technology control to use in this scenario?

A. Content filtering
B. IDS
C. Audit logs
D. DLP


Answer: D. DLP

Computer Science & Information Technology

You might also like to view...

Together, the appearance and the way in which the user interacts with the application are known as that application’s ________.

a. abstract window toolkit. b. look-and-feel. c. swing factor. d. All of the above.

Computer Science & Information Technology

Briefly describe how to insert a three-part footer.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a task you can perform using the Windows Server Backup console?

A. Create a scheduled backup job B. Perform a recovery operation C. Boot the system into Windows RE mode D. Configure backup performance

Computer Science & Information Technology

This can result in network issues or loss of network connectivity of the computer. It is always a good idea to create a firewall rule and try it out, one at a time.

What will be an ideal response?

Computer Science & Information Technology