An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the computer is in use. Which of the following can be implemented?
A. Cluster tip wiping
B. Individual file encryption
C. Full disk encryption
D. Storage retention
Answer: A. Cluster tip wiping
You might also like to view...
Which of the following JPA-related statements is false?
a. You can update an existing entity by modifying its entity object in the context of a transaction. b. Once a transaction is committed, the changes to the entity are saved to the database. c. You can delete an existing entity. d. When you commit a transaction the entity is kept as a backup in the database.
External style sheets are also called ____ style sheets.
A. linked B. embedded C. global D. independent
________ uses a comma to separate one column from the next, enabling the receiving software to distinguish one set of field values from the next
A) Excel tables B) CSV text files C) Fixed-length text files D) Linked files
The most disconcerting of all computer crime involves the sexual exploitation of ________
Fill in the blank(s) with the appropriate word(s).