Which one of the following categories of secure data removal techniques would include degaussing?

A. Clear
B. Shrink
C. Purge
D. Destroy


Answer: C. Purge

Computer Science & Information Technology

You might also like to view...

When the NIS server starts, it communicates with the listening ____ and the RPC program number it's intended to serve.

A. IP address B. queue C. port D. domain

Computer Science & Information Technology

Provide some steps on how to Install and Verify the Mininet Topology

In this part, you will use a Python script to set up the Mininet Topology inside the CyberOps VM. You will then record the IP and MAC addresses for H1 and H2.

Computer Science & Information Technology

In the expression =Sum([Price]), the ____________________ function is used.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What common file extension refers to the Fraunhoffer MPEG-1 Layer 3 codec?

A. MOV B. MIDI C. WAV D. MP3

Computer Science & Information Technology