The network security manager has been notified by customer service that employees have been sending unencrypted confidential information via email. Which of the following should the manager select to BEST detect and provide notification of these occurrences?

A. DLP
B. SSL
C. DEP
D. UTM


Answer: A. DLP

Computer Science & Information Technology

You might also like to view...

Processes on a data flow diagram:

A) transform incoming data into outgoing information. B) represent the system boundaries. C) represent the work that a specific user performs. D) change the nature of the relationships on an entity-relationship diagram.

Computer Science & Information Technology

When using Goal Seek, the cell reference of the desired value is entered in the ________ text box of the Goal Seek dialog box

A) By changing cell: B) Set cell: C) To value: D) Column input cell:

Computer Science & Information Technology

The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _____ Auto Fill Option that fills the destination area using the format of the source area; no content is filled.

A. Copy Cells B. Fill Formatting Only C. Fill Without Formatting D. none of the above

Computer Science & Information Technology