Answer:
Correct answer to the following question is database based detection.
Explanation:
It can record the reference of database dumps in the network traffics and in the text documents. This type of technology make it possible for quickly intercept copied the database information and determine the mail-factor and blocks the transfers of data to the outside parties, and to collect the digital evidence of incidents for the investigative or the legal purposes.