What process is typically used to ensure data security for workstations that are being removed from service but that will be resold or otherwise reused?

A. Destruction
B. Erasing
C. Sanitization
D. Clearing


Answer: C. Sanitization

Computer Science & Information Technology

You might also like to view...

Method getFont of class Graphics returns ________.

a. the current font name as a string b. the font size in points c. a Graphics object representing the current font d. a Font object representing the current font

Computer Science & Information Technology

You may test an initial condition of a posttest loop by ____.

A. using a nested loop for the initial condition B. placing the posttest loop inside a selection structure C. resetting the counter variable on each pass of the loop D. initializing all loop variables to zero

Computer Science & Information Technology

When Outlook detects a macro attempting to send an e-mail, it launches a warning box and automatically denies the sending of the object

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following statements is not true about pop filters?

a. A pop filter is a mesh screen placed in front of a microphone. b. A pop filter can help make your recordings sound more professional. c. A pop filter helps to prevent popping sounds on a recording. d. A pop filter is a software device attached to the computer's sound card.

Computer Science & Information Technology