Multiple Choice
Adding invisible information to a file that can be used to identify its source is called ________.
A) DRM
B) data extrusion management
C) watermarking
D) None of the above.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: Incremental backups are usually discarded after the
Q12: The term sanitizing has lost its distinct
Q13: Example of DBMSs include _.<br>A) MySQL, Oracle<br>B)
Q14: Backup policies should be audited regularly and
Q15: Technology is the most effective method of
Q17: Triggers are damaging code that attackers use
Q18: Incremental and full backups must be restored
Q19: Backup media should be encrypted.
Q20: Backing up data to a second hard
Q21: Image backup is a fast form of