1.
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
2.
Tokenization requires two distinct _________________ .
3.
DLP can be combined with what other security technology to enhance data controls?
4.
What is the intellectual property protection for a confidential recipe for muffins?
5.
Every security program and process should have which of the following?
6.
DLP solutions can aid in deterring loss due to which of the following?
7.
All policies within the organization should include a section that includes all of the following, except:
8.
Proper implementation of DLP solutions for successful function requires which of the following?
9.
What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?
10.
Data labels could include all the following, except: