Which of the following techniques should the consultant use to discover the source of the information leaks?

A security consultant is investigating acts of corporate espionage within an organization. Each
time the organization releases confidential information to high-ranking engineers, the information
is soon leaked to competing companies. Which of the following techniques should the consultant
use to discover the source of the information leaks?

A security consultant is investigating acts of corporate espionage within an organization. Each
time the organization releases confidential information to high-ranking engineers, the information
is soon leaked to competing companies. Which of the following techniques should the consultant
use to discover the source of the information leaks?

A.
Digital watermarking

B.
Steganography

C.
Enforce non-disclosure agreements

D.
Digital rights management



Leave a Reply 0

Your email address will not be published. Required fields are marked *