An internal employee has sold a copy of the production customer database that was being used
for upgrade testing to outside parties via HTTP file upload. The Chief Information Officer (CIO) has
resigned and the Chief Executive Officer (CEO) has tasked the incoming CIO with putting effective
controls in place to help prevent this from occurring again in the future. Which of the following
controls is the MOST effective in preventing this threat from re-occurring?
A.
Network-based intrusion prevention system
B.
Data loss prevention
C.
Host-based intrusion detection system
D.
Web application firewall