dlp can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization's security policies. which of the following dlp implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?