CompTIA PenTest+ PT0-002 Practice Question

After completing a successful penetration testing engagement, you are required to perform data destruction to ensure no residual data from the test remains on the client's systems or your own equipment. Which of the following methods is the most appropriate for securely eradicating files containing sensitive information collected during the testing?

  • Delete the files and then empty the recycle bin or trash folder on all devices used.

  • Encrypt the data on the drives without overwriting the original files.

  • Use an approved overwrite utility to perform a secure wipe of storage devices.

  • Format the drives on which sensitive data is stored.

CompTIA PenTest+ PT0-002
Reporting and Communication
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot