Multiple Choice
Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
A) 1/0 rewrite software
B) Drill holes in the platters and smash the pieces with a hammer
C) Hold a magnet over each platter
D) Repartition the hard drive into multiple partitions using different file systems
Correct Answer:

Verified
Correct Answer:
Verified
Q78: If you have direct knowledge of child
Q79: Match the physical device with the description.<br>Smart
Q80: An RFID tag is commonly used for
Q81: A SPAN is a special type of
Q82: What network environment has centralized servers for
Q84: Antivirus and antispyware are not needed if
Q85: A proxy server acts as an agent
Q86: A retinal scanner is a type of
Q87: In which scenario would a rootkit be
Q88: What should you do if someone is