How would you permanently remove the threat of data falling into the wrong hands?
Answer / eryn kaeberle
There is only one way to 100% ensure this, destroy any and all devices the data is stored on. There are industrial shredders designed for turning hard drives into confetti.
| Is This Answer Correct ? | 3 Yes | 0 No |
What’s the difference between a White Box test and a Black Box test?
You see a user logging in as root to perform basic functions. Is this a problem?
What is database in a computer?
What is the difference between a virus and a trojan?
0 Answers Tavant Technologies, Zensar,
How would you compromise an “Office Workstation” at a hotel?
What are the most common computer applications?
What is the difference between Information Protection and Information Assurance?
What is dora process in DHCP and how it works?
What is the difference between an HIDS and a NIDS?
I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?
What is the Three-way handshake? How can it be used to create a DOS attack?
How do you protect your home Wireless Access Point?