Question 77:
An information security analyst is working with a data owner to identify the appropriate controls to preserve the confidentiality of data within an enterprise environment. One of the primary concerns is exfiltration of data by malicious insiders. Which of the following controls is the MOST appropriate to mitigate risks?
Answer options:
A. Data deduplication B. OS fingerprinting C. Digital watermarking D. Data loss prevention