Free CompTIA PenTest+ PT0-002 Practice Question

After completing a successful penetration testing engagement, you are required to perform data destruction to ensure no residual data from the test remains on the client's systems or your own equipment. Which of the following methods is the most appropriate for securely eradicating files containing sensitive information collected during the testing?

  • Delete the files and then empty the recycle bin or trash folder on all devices used.

  • Use an approved overwrite utility to perform a secure wipe of storage devices.

  • Encrypt the data on the drives without overwriting the original files.

  • Format the drives on which sensitive data is stored.

This question's topic:
CompTIA PenTest+ PT0-002 / 
Reporting and Communication
Your Score:

Check or uncheck an objective to set which questions you will receive.