Home
You may like this!
46.
Which of the following statements correctly identifies a problem with sanitization methods?
  • A.
    Methods are not available to remove data ensuring that unauthorized personnel cannot retrieve data.
  • B.
    Even fully incinerated media can offer extractable data.
  • C.
    Personnel can perform sanitization steps improperly
  • D.
    Stored data is physically etched into the media.
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Sanitization can be unreliable because personnel can perform the purging, degaussing, or other processes improperly. When done properly, purged data is not recoverable using any known methods. Data cannot be retrieved from incinerated, or burned, media. Data is not physically etched into the media.
Report
Name Email  
47.
Which of the following choices is the most reliable method of destroying data on a solid state drive?
  • A.
    Erasing
  • B.
    Degaussing
  • C.
    Deleting
  • D.
    Purging
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Purging is the most reliable method of the given choices. Purging overwrites the media with random bits multiple times and includes additional steps to ensure data is removed. While not an available answer choice, destruction of the drive is a more reliable method. Erasing or deleting processes rarely remove the data from media, but instead mark it for deletion. Solid state drives (SSDs) do not have magnetic flux so degaussing an SSD doesn’t destroy data.
Report
Name Email  
48.
Which of the following is the most secure method of deleting data on a DVD?
  • A.
    Formatting
  • B.
    Deleting
  • C.
    Destruction
  • D.
    Degaussing
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Physical destruction is the most secure method of deleting data on optical media such as a DVD. Formatting and deleting processes rarely remove the data from any media. DVDs do not have magnetic flux so degaussing a DVD doesn’t destroy data.
Report
Name Email  
49.
Which of the following does not erase data?
  • A.
    Clearing
  • B.
    Purging
  • C.
    Overwriting
  • D.
    Remanence
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Data remanence refers to data remnants that remain on a hard drive as residual magnetic flux. Clearing, purging, and overwriting are valid methods of erasing data.
Report
Name Email  
50.
Which one of the following is based on Blowfish and helps protect against rainbow table attacks?
  • A.
    3DES
  • B.
    AES
  • C.
    Bcrypt
  • D.
    SCP
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Linux systems use bcrypt to encrypt passwords, and bcrypt is based on Blowfish. Bcrypt adds 128 additional bits as a salt to protect against rainbow table attacks. Advanced Encryption Standard (AES) and Triple DES (or 3DES) are separate symmetric encryption protocols, and neither one is based on Blowfish, or directly related to protecting against rainbow table attacks. Secure Copy (SCP) uses Secure Shell (SSH) to encrypt data transmitted over a network.
Report
Name Email