Which of the following would BEST address the risk of data leakage?
A.
File backup procedures
B.
Database integrity checks
C.
Acceptable use policies
D.
Incident response procedures
Explanation:
Acceptable use policies are the best measure for preventing the unauthorized disclosure of
confidential information. The other choices do not address confidentiality of information.