Which of the following is defined by NIST as “the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive.”

A) Data destruction
B) Degaussing
C) Disk wiping
D) Chain of custody


A) Data destruction

Computer Science & Information Technology

You might also like to view...

Lara is spending a day at the beach and she has brought along a mobile device designed specifically for reading books and magazines. Lara is reading the latest issue of Vogue on a(n) ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How many times is the recursive moveDisks method invoked for 4 disks?

a. 5 b. 10 c. 15 d. 20

Computer Science & Information Technology

Case-Based Critical Thinking Question ? Mazie owns a small art shop, and has built a following on Twitter. She is considering adding one or more buttons or feed widgets to her website to integrate it with her Twitter account. Which of the following would display the tweets that Mazie posts from her art shop account?

A. a Tweet button B. an account feed C. a hash tag feed D. a Follow button

Computer Science & Information Technology

Which of the following would BEST meet a server authentication requirement for a wireless network, but the network has no PKI in place?

A. PEAP B. PAP C. EAP-TLS D. LEAP

Computer Science & Information Technology