Which of the following helps to apply the proper security controls to information?
 
A.
 Data classification
B.
 Deduplication
C.
 Clean desk policy
D.
 Encryption
Explanation:
Information classification is done by confidentiality and comprises of three categories, namely: public use,
internal use and restricted use. These categories make applying the appropriate policies and security controls
practical.
 
                