An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the
computer is in use. Which of the following can be implemented?
Cluster tip wiping
Individual file encryption
Full disk encryption
A computer hard disk is divided into small segments called clusters. A file usually spans several clusters but
rarely fills the last cluster, which is called cluster tip. This cluster tip area may contain file data because the size
of the file you are working with may grow or shrink and needs to be securely deleted.