What process is typically used to ensure data security for workstations that are being removed from service but that will be resold or otherwise reused?

A. Destruction
B. Erasing
C. Sanitization
D. Clearing

Answer: C. Sanitization

Computer Science & Information Technology

You might also like to view...

How many potential MAC address schemes are possible?

A. 232 B. 246 C. 248 D. 264

Computer Science & Information Technology

The ____ filter allows multiple criteria to be selected and a sort order to be defined for the selected records.

A. AutoFilter B. Filter by Selection C. Filter B Form D. Advanced Filter/Sort

Computer Science & Information Technology