An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?
A. Sanitization policy
B. Data sovereignty
C. Encryption policy
D. Retention standards
Answer: D. Retention standards
Computer Science & Information Technology
You might also like to view...
Which of the following is true?
A) All hashing algorithms give different hash codes to different objects, and the same hash code to equal objects B) A hash code of a Number object may be a float, an int, or a double C) Any application that overrides the Object hashCode method should also override the equals method D) Any application that overrides the Object equals method should also override the hashCode method
Computer Science & Information Technology
The Linux kernel initially supported the _________ platform.
a) Intel x86 b) Sun SPARC c) Motorola 68000 d) all of the above
Computer Science & Information Technology