Which of the following is the MOST secure way to destroy sensitive data?

A. Use the command line delete on the data.
B. Use a program that rewrites over the data several times.
C. Move the data into the Recycle Bin and then empty it.
D. Move the data onto a portable drive and then destroy the drive.


Answer: B. Use a program that rewrites over the data several times.

Computer Science & Information Technology

You might also like to view...

What is the most commonly used type of database according to the book's authors?

1. flat file 2. document-based 3. relational 4. No SQL

Computer Science & Information Technology

____ apps are written in traditional Web authoring languages and they use the Web display technology included in the default Web browser that comes with the device's operating system to display the app.

A. Native B. Dynamic C. Baseline D. Web-based

Computer Science & Information Technology

To calculate statistics for only those records that satisfy certain criteria, select ____ as the entry in the Total row for the field, and then enter the criterion in the Criteria row.

A. Having B. Where C. Restrict D. Find

Computer Science & Information Technology

____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.

A. Security B. Privacy C. Filtering D. Control

Computer Science & Information Technology