Ursula believes that many individuals in her organization are storing sensitive information on their laptops in a manner that is unsafe and potentially violates the organization's security policy. What control can she use to identify the presence of these files?
A. Network DLP
B. Network IPS
C. Endpoint DLP
D. Endpoint IPS
Answer: C. Endpoint DLP
You might also like to view...
Each row in a table is also called a(n)
(A) record. (B) array. (C) field. (D) selection.
If you have a class B IPv4 network and want to divide it into subnets, each with 126 hosts, which subnet mask should you use? How many networks 4 will be available? What are the four addresses (broadcast and network num- ber) for the network starting at 131.204.18?
What will be an ideal response?
To add an element at the end of an ArrayList, call the _______ method.
a) add b) addToEnd c) append d) insertAt
A camera with a digital zoom of 5x and an optical zoom of 5x has a total zoom of ________
Fill in the blank(s) with correct word