Which of the following should be implemented if the organization wants to monitor unauthorized transfers of confidential information?

Which of the following should be implemented if the organization wants to monitor unauthorized transfers of confidential information?




a. Content inspection
b. Proxy server
c. Protocol analyzer
d. Packet-filtering firewall





Answer: A


Learn More :

Network Security

Learn More Multiple Choice Question :