DLP can be used to identify sensitive files in a file system and then embed theorganization's security policy within the file.Which of the following DLP implementations travels with sensitive data files when they aremoved or copied?
Network DLP
Cloud DLP
Endpoint DLP
File-level DLP