To me i would choose ans: B. assuming two encryption on the part of encryption.
A. would be false, since wiping does not involve destroying of the physical disk. this would be Data disposal.
C. Would have been correct if the word temporally was not used. Disk wiping involves the permanent removal of data, never to be accessed. And temporally doing this would make the data accessible again after a while.
D. would be false, since disk wiping does not necessarily have to be bulk wipping.
C is the answer. Data wiping makes data unreadable, but it does not remove the data. Data wiping is the process of overwriting the data on a particular drive to such an extent that the original data is unreadable.
When one formats a drive, they assign all the space on the drive as free space for use by the operating system. This means the data is still there, just that it cannot be read directly using the OS. A Wipe on the other hand rewrites everything to 0, meaning all the data is wiped.
Data wiping is a data destructive process which enables the storage medium to be reused without loss of storage capacity.
B is wrong. According to the best practices, avoid using file deletion, disk formatting and "one way" encryption to dispose of sensitive data. These methods leave data intact and vulnerable to being retrived.
Data wiping is a process of logically removing data from a read/write medium so that the data can no longer be read. Users can do a secure erase from the Lifecycle Controller.
This is written in the DEA 41t1 course...
D is the correct answer :
Data wiping is defined as a process of logically removing data from a read/write medium so that it can no longer be read. This process is performed externally by physically connecting storage media to a hardware bulk-wiping device, or internally by booting a computer from a CD or network. Data wiping is a data destructive process which enables the storage medium to be reused without loss of storage capacity.
Correct answer: A
Data Wiping
Best Practices:
• Avoid using file deletion, disk formatting, and “one way” encryption to dispose of
sensitive data—these methods are not effective because they leave most of the
data intact and vulnerable to being retrieved by a determined person with the
right tools.
• Destroy CDs, DVDs, and any magneto-optical disks by pulverizing, cross-cut
shredding, or burning.
• Create formal, documented processes for data destruction within your
organization and require that partner organizations do the same.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Sayile97
1 year, 8 months agorebadan
1 year, 10 months agomickytm
1 year, 8 months agochiocg
2 years, 2 months agoTumisang
2 years, 4 months agoHideo
2 years, 5 months agoTumisang
2 years, 6 months agoDrDyzen
2 years, 8 months agoirinaz
2 years, 9 months agoStorageGuy
2 years, 10 months agoStorageGuy
2 years, 10 months agoAbdelrahmanHAwd
3 years, 1 month agoXOUSS
3 years, 3 months agoshaolong1231
3 years, 8 months agoFakhry
3 years, 8 months agoshaolong1231
3 years, 8 months agolobana
3 years, 9 months ago