A company is concerned about the security of its data repository that contains customer PII. A systems administrator is asked to deploy a security control that will prevent the exfiltration of such dat
a. Which of the following should the systems administrator implement?
Currently there are no comments in this discussion, be the first to comment!