Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

QuestionsCategory: CCSPWhich of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Admin Staff asked 6 months ago
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

A. Cryptographic erasure

B. Zeroing

C. Overwriting

D. Deletion








 

Suggested Answer: D

Community Answer: D

Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.

This question is in CCSP Certified Cloud Security Professional Exam
For getting Certified Cloud Security Professional (CCSP) Certificate






Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by ISC. 
Trademarks, certification & product names are used for reference only and belong to ISC.
The website does not contain actual questions and answers from ISC's Certification Exams.
Question Tags:

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.