Certified Cloud Security Professional – CCSP – Question011
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment? A. Cryptographic erasure B. Zeroing C. Overwriting D. Deletion
Correct Answer: D
Explanation:
Explanation: Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
Please disable your adblocker or whitelist this site!