Permanently making data inaccessible according to Department of Defense standards can be done with which of the following techniques?

a. Using Windows Delete utility, followed by emptying the Recycle Bin.
b. The EraseAll utility in Windows performs a DoD compliate file deletion.
c. Using a wiping utility that overwrites the medium surface multiple times with random zeroes and ones.
d. Incinerating the medium.


c. Using a wiping utility that overwrites the medium surface multiple times with random zeroes and ones.
d. Incinerating the medium.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a major type of B2B model?

(a) supplier-oriented. (b) Web-oriented. (c) buyer-oriented. (d) all of the above are major types of B2B models.

Computer Science & Information Technology

A tab stop should always be set for AutoNumber fields

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ can generate a report to help resolve issues between PowerPoint 2016 and earlier versions

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ signature is a stamp of authentication

Fill in the blank(s) with correct word

Computer Science & Information Technology