An internal employee has sold a copy of the production customer database that was being used for upgrade testing to outside parties via HTTP file upload. The Chief Information Officer (CIO) has resigned and the Chief Executive Officer (CEO) has tasked the incoming CIO with putting effective controls in place to help prevent this from occurring again in the future.
Which of the following controls is the MOST effective in preventing this threat from re-occurring?
A . Network-based intrusion prevention system
B . Data loss prevention
C . Host-based intrusion detection system
D . Web application firewall
Answer: B