Which of the following methods should be used to effectively erase sensitive data from portable storage devices that are to be reused?
A. Formatting the portable device
B. Using media sanitization software
C. Overwriting the sensitive data
D. Exposing the portable device to a magnetic field
A. Formatting the portable device
B. Using media sanitization software
C. Overwriting the sensitive data
D. Exposing the portable device to a magnetic field