A company is preparing to decommission an offline, non-networked root certificate server. Before sending the
server’s drives to be destroyed by a contracted company, the Chief Security Officer (CSO) wants to be certain
that the data will not be accessed. Which of the following, if implemented, would BEST reassure the CSO?
Disk hashing procedures
Full disk encryption
Data retention policies
Disk wiping procedures
Removable media encryption
B: Full disk encryption is when the entire volume is encrypted; the data is not accessible to someone who might
boot another operating system in an attempt to bypass the computer’s security. Full disk encryption is
sometimes referred to as hard drive encryption.
D: Disk wiping is the process of overwriting data on the repeatedly, or using a magnet to alter the magnetic
structure of the disks. This renders the data unreadable.