Which two methods would be used to ensure corporate confidential data on a hard drive is removed before donating the hard drive to a school? (Select two.)
A) Antivirus software
B) Degauss
C) Drill holes into the platters
D) Remote wipe
E) Secure erasing
B, E
You might also like to view...
Peer-to-peer systems typically depend on untrusted and volatile computer systems for most of their resources. Trust is a social phenomenon with technical consequences. Volatility (i.e. unpredicatable availability) also is often due to human actions. Elaborate your answers to Exercise 10.4. by discussing the possible ways in which each of them is likely to differ according to the following attributes of the computers used: i) ownership ii) geographic location iii) network connectivity iv)country or legal jurisdiction What does this suggest about policies for the placement of data objects in a peer-to-peer storage service?
What will be an ideal response?
The Linux basename utility has an optional second argument. If you give the command basename path suffix, basename removes the suffix and the prefix from path:
$ basename src/shellfiles/prog.bash .bash prog $ basename src/shellfiles/prog.bash .c prog.bash
A(n) ________ is a mail merge file that contains organized data necessary to merge within a document for mailing purposes
Fill in the blank(s) with correct word
______-based web servers offer virtual storage for not only your website content, but also for other files related to your business or personal life.
A. ISP B. Cloud C. VPS D. Sky