medium
Single Answer
0Leonidas works for a company that suffered a major data breach in the past year and now wants to ensure that it knows where data is located and if it is being transferred, copied to a thumb drive, or stored in an unauthorized network file share. Which of the following solutions is best suited to tagging, monitoring, and limiting where files are transferred to?
Answer Options
A
DRM
B
DLP
C
A network IPS
D
Antivirus
Correct Answer: B
Explanation
A data loss prevention (DLP) system can tag, monitor, and limit where files are transferred. DRM controls usage, IPS detects network threats, and antivirus is not designed for this purpose.