A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

A. DLP
B. AUP
C. NDA
D. SLA


Answer: A. DLP

Computer Science & Information Technology

You might also like to view...

Returning references to non-const, private data:

a. Allows private functions to be modified. b. Is only dangerous if the binary scope resolution operator (::) is used in the function prototype. c. Allows private member variables to be modified, thus “breaking encapsulation.” d. Results in a compiler error.

Computer Science & Information Technology

A copyright protects literary and artistic works

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the following commands with their outcomes:

I. Database Splitter II. Database Documenter III. Analyze Performance IV. Analyze Table V. Encryption A. Produces recommendations, suggestions, and ideas B. Allows you to add password protection C. Divides the database into front-end and back-end database files D. Helps to optimize your database E. Can create a very long report

Computer Science & Information Technology

are windows that can display information for, and gather information from, the application’s user.

a) Projects b) Dialogs c) Solutions d) Popups

Computer Science & Information Technology