– Leaked to the media via printing of the documents
– Sent to a personal email address
– Accessed and viewed by systems administrators
– Uploaded to a file storage site
Which of the following would mitigate the department's concerns?
A. Data loss detection, reverse proxy, EDR, and PGP
B. VDI, proxy, CASB, and DRM
C. Watermarking, forward proxy, DLP, and MFA
D. Proxy, secure VPN, endpoint encryption, and AV