Susan is preparing to decommission her organization's archival DVD-ROMs that contain Top Secret data. How should she ensure that the data cannot be exposed?

A. Degauss
B. Zero wipe
C. Pulverize
D. Secure erase


Answer: C. Pulverize

Computer Science & Information Technology

You might also like to view...

Use cases are helpful because they:

What will be an ideal response?

Computer Science & Information Technology

In the context of a database management system (DBMS), a(n) _____ interacts with other programs or applications and only indirectly interacts with people or users.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A technique that blurs the edges of the content in a picture to make boundaries less prominent.

What will be an ideal response?

Computer Science & Information Technology

A(n) namespace is a defined collection of element and attribute names.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology