Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
A . Cryptographic erasure
B . Zeroing
C . Overwriting
D . Deletion

Answer: D

Explanation:

Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.

Latest CCSP Dumps Valid Version with 512 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments