For implementing enterprise resource planning (ERP) systems, the first task is to create amodel of current business procedures and practices, which is called the as-is model.
Indicate whether the statement is true or false
Question 2
________ are countermeasures designed to prevent sensitive data from being released tounauthorized persons.
A) Malware definitions
B) Attack vectors
C) Data loss prevention systems
D) Data extrusion prevention systems