Permanently making data inaccessible according to Department of Defense standards can be done with which of the following techniques?
a. Using Windows Delete utility, followed by emptying the Recycle Bin.
b. The EraseAll utility in Windows performs a DoD compliate file deletion.
c. Using a wiping utility that overwrites the medium surface multiple times with random zeroes and ones.
d. Incinerating the medium.
c. Using a wiping utility that overwrites the medium surface multiple times with random zeroes and ones.
d. Incinerating the medium.
You might also like to view...
Which of the following is not a major type of B2B model?
(a) supplier-oriented. (b) Web-oriented. (c) buyer-oriented. (d) all of the above are major types of B2B models.
A tab stop should always be set for AutoNumber fields
Indicate whether the statement is true or false
The ________ can generate a report to help resolve issues between PowerPoint 2016 and earlier versions
Fill in the blank(s) with correct word
A ________ signature is a stamp of authentication
Fill in the blank(s) with correct word