Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
Which of the following should the security administrator implement to limit web traffic based on country of origin?