A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
A. DLP
B. AUP
C. NDA
D. SLA
Answer: A. DLP
You might also like to view...
Returning references to non-const, private data:
a. Allows private functions to be modified. b. Is only dangerous if the binary scope resolution operator (::) is used in the function prototype. c. Allows private member variables to be modified, thus “breaking encapsulation.” d. Results in a compiler error.
A copyright protects literary and artistic works
Indicate whether the statement is true or false
Match the following commands with their outcomes:
I. Database Splitter II. Database Documenter III. Analyze Performance IV. Analyze Table V. Encryption A. Produces recommendations, suggestions, and ideas B. Allows you to add password protection C. Divides the database into front-end and back-end database files D. Helps to optimize your database E. Can create a very long report
are windows that can display information for, and gather information from, the application’s user.
a) Projects b) Dialogs c) Solutions d) Popups