Question: Which of the following would BEST address the risk of data leakage?
A.) File backup procedures
B.) Database integrity checks
C.) Acceptable use policies
D.) Incident response procedures

Download pdf (with explanations) edition of this exam.