An organization processes credit card transactions and is concerned that an employee may
intentionally email credit card numbers to external email addresses. This company should
consider which of the following technologies?

A.
IDS
B.
Firewalls
C.
DLP
D.
IPS