Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
DLP solutions
strong user authentication
encryption
complex cloud-based web proxies
antispoofing programs
Submit