Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?
Which of the following would be the QUICKEST means of removing data from a hard drive, when there is no consideration regarding the total destruction of the data?