The user of a news service accidently accesses another user’s browsing history. From this the user can tell
what competitors are reading, querying, and researching. The news service has failed to properly implement
which of the following?
A.
Application white listing
B.
In-transit protection
C.
Access controls
D.
Full disk encryption