Which of the following is the MOST secure method, short of physical destruction, that would be used to ensure that data on a hard drive cannot be recovered?
Which of the following technologies should a technician recommend in order for the user to have access to both systems simultaneously?