Susan is preparing to decommission her organization's archival DVD-ROMs that contain Top Secret data. How should she ensure that the data cannot be exposed?
A. Degauss
B. Zero wipe
C. Pulverize
D. Secure erase
Answer: C. Pulverize
Computer Science & Information Technology
You might also like to view...
Use cases are helpful because they:
What will be an ideal response?
Computer Science & Information Technology
In the context of a database management system (DBMS), a(n) _____ interacts with other programs or applications and only indirectly interacts with people or users.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A technique that blurs the edges of the content in a picture to make boundaries less prominent.
What will be an ideal response?
Computer Science & Information Technology
A(n) namespace is a defined collection of element and attribute names.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology