A dumpster diver recovers several hard drives from a company and is able to obtain confidential data from one of the hard drives. The company then discovers its information is posted online. Which of the following methods would have MOST likely prevented the data from being exposed?

A. Removing the hard drive from its enclosure
B. Using software to repeatedly rewrite over the disk space
C. Using Blowfish encryption on the hard drives
D. Using magnetic fields to erase the data


Answer: D. Using magnetic fields to erase the data

Computer Science & Information Technology

You might also like to view...

Excel includes more than 250 functions from which you can choose.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Entering a negative value in the Set rotation text box rotates artwork in a clockwise direction.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A waypoint is a geolocational point of interest created by a user

Indicate whether the statement is true or false.

Computer Science & Information Technology

The Line tool is accessed using the More button in the ____ group on the Design tab.

A. Header/Footer B. Themes C. Tools D. Controls

Computer Science & Information Technology