What process is typically used to ensure data security for workstations that are being removed from service but that will be resold or otherwise reused?
A. Destruction
B. Erasing
C. Sanitization
D. Clearing
Answer: C. Sanitization
Computer Science & Information Technology
You might also like to view...
How many potential MAC address schemes are possible?
A. 232 B. 246 C. 248 D. 264
Computer Science & Information Technology
The ____ filter allows multiple criteria to be selected and a sort order to be defined for the selected records.
A. AutoFilter B. Filter by Selection C. Filter B Form D. Advanced Filter/Sort
Computer Science & Information Technology