Ursula believes that many individuals in her organization are storing sensitive information on their laptops in a manner that is unsafe and potentially violates the organization's security policy. What control can she use to identify the presence of these files?

A. Network DLP
B. Network IPS
C. Endpoint DLP
D. Endpoint IPS


Answer: C. Endpoint DLP

Computer Science & Information Technology

You might also like to view...

Each row in a table is also called a(n)

(A) record. (B) array. (C) field. (D) selection.

Computer Science & Information Technology

If you have a class B IPv4 network and want to divide it into subnets, each with 126 hosts, which subnet mask should you use? How many networks 4 will be available? What are the four addresses (broadcast and network num- ber) for the network starting at 131.204.18?

What will be an ideal response?

Computer Science & Information Technology

To add an element at the end of an ArrayList, call the _______ method.

a) add b) addToEnd c) append d) insertAt

Computer Science & Information Technology

A camera with a digital zoom of 5x and an optical zoom of 5x has a total zoom of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology