medium
Single Answer
0

Leonidas works for a company that suffered a major data breach in the past year and now wants to ensure that it knows where data is located and if it is being transferred, copied to a thumb drive, or stored in an unauthorized network file share. Which of the following solutions is best suited to tagging, monitoring, and limiting where files are transferred to?

Answer Options

A

DRM

B

DLP

C

A network IPS

D

Antivirus

Correct Answer: B

Explanation

A data loss prevention (DLP) system can tag, monitor, and limit where files are transferred. DRM controls usage, IPS detects network threats, and antivirus is not designed for this purpose.