Which of the following would BEST address the risk of data leakage?
A. File backup procedures
B. Database integrity checks
C. Acceptable use policies
D. Incident response procedures
A. File backup procedures
B. Database integrity checks
C. Acceptable use policies
D. Incident response procedures