nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #421

CERTIFIED-IN-CYBERSECURITY Question #421: Real Exam Question with Answer & Explanation

The correct answer is D: Overwriting. Overwriting involves writing multiple patterns across all storage media (see ISC2 Study Guide, Chapter 5, Module 1). This method ensures that the original data cannot be recovered. For example, if an organization wants to repurpose a hard drive, they can overwrite the drive with

Security Principles

Question

Which method involves writing multiple patterns across all storage media?

Options

  • ADeleting
  • BDestroying
  • CPurging
  • DOverwriting

Explanation

Overwriting involves writing multiple patterns across all storage media (see ISC2 Study Guide, Chapter 5, Module 1). This method ensures that the original data cannot be recovered. For example, if an organization wants to repurpose a hard drive, they can overwrite the drive with multiple data patterns to ensure that the original data is completely erased and cannot be recovered. The other options are methods of media sanitization, but none involves writing multiple patterns across all storage media. Deleting removes the reference to the data, but does not physically delete it. Purging is a more comprehensive form of data erasure that often includes degaussing or secure deletion methods, but does not specifically involve writing multiple patterns across all storage media. Destroying involves physically damaging the storage media to make it unreadable, such as shredding a hard drive

Topics

#Data Sanitization#Overwriting#Secure Data Disposal#Storage Media

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions