A company is preparing to decommission an offline, non-networked root certificate server. Before sending the server's drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO?
A. Disk hashing procedures
B. Full disk encryption
C. Data retention policies
D. Disk wiping procedures
E. Removable media encryption
Answer:
B. Full disk encryption
D. Disk wiping procedures
You might also like to view...
Which of the following statements about the C++ Standard Library is false:
a. The C++ Standard Library consists of classes and functions that perform tasks. b. The C++ Standard Library is an important part of the C++ “world.” c. An advantage of using classes and functions from the C++ Standard Library is saving the effort of designing, developing and testing new classes. d. The C++ Standard Library functions and classes are not included in every C++ implementation.
Use either Visio or Visible Analyst to view the UPDATE LAB IMAGE sequence diagram.
What will be an ideal response?
____ spacing determines the width of individual characters.
a. Predetermined b. Glyph c. Ad hoc d. Familial
All of C++'s higher-level I/O methods and streams are based on ____ methods.
A. other higher-level B. lower-level character C. character manipulation D. string manipulation