An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?

A. Sanitization policy
B. Data sovereignty
C. Encryption policy
D. Retention standards

Answer: D. Retention standards

Computer Science & Information Technology

You might also like to view...

Which of the following is true?

A) All hashing algorithms give different hash codes to different objects, and the same hash code to equal objects B) A hash code of a Number object may be a float, an int, or a double C) Any application that overrides the Object hashCode method should also override the equals method D) Any application that overrides the Object equals method should also override the hashCode method

Computer Science & Information Technology

The Linux kernel initially supported the _________ platform.

a) Intel x86 b) Sun SPARC c) Motorola 68000 d) all of the above

Computer Science & Information Technology