Which of the following is defined by NIST as “the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive.”
A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody
A) Data destruction
You might also like to view...
Lara is spending a day at the beach and she has brought along a mobile device designed specifically for reading books and magazines. Lara is reading the latest issue of Vogue on a(n) ________.
Fill in the blank(s) with the appropriate word(s).
How many times is the recursive moveDisks method invoked for 4 disks?
a. 5 b. 10 c. 15 d. 20
Case-Based Critical Thinking Question ? Mazie owns a small art shop, and has built a following on Twitter. She is considering adding one or more buttons or feed widgets to her website to integrate it with her Twitter account. Which of the following would display the tweets that Mazie posts from her art shop account?
A. a Tweet button B. an account feed C. a hash tag feed D. a Follow button
Which of the following would BEST meet a server authentication requirement for a wireless network, but the network has no PKI in place?
A. PEAP B. PAP C. EAP-TLS D. LEAP