How would you permanently remove the threat of data falling into the wrong hands?
Answer / eryn kaeberle
There is only one way to 100% ensure this, destroy any and all devices the data is stored on. There are industrial shredders designed for turning hard drives into confetti.
| Is This Answer Correct ? | 3 Yes | 0 No |
What is the Three-way handshake? How can it be used to create a DOS attack?
What are the most common computer applications?
What are the three ways to authenticate a person?
What is SSL and why is it not enough when it comes to encryption?
How would you compromise an “Office Workstation” at a hotel?
Why would you want to use SSH from a Windows pc?
You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
If you were going to break into a database-based website, how would you do it?
What is the Chain of Custody?
What is data source in computer?
What is database in a computer?