A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such data. Which of the following should the systems administrator implement?
A. DLP
B. WAF
C. FIM
D. ADC
A. DLP
B. WAF
C. FIM
D. ADC