After completing a successful penetration testing engagement, you are required to perform data destruction to ensure no residual data from the test remains on the client's systems or your own equipment. Which of the following methods is the most appropriate for securely eradicating files containing sensitive information collected during the testing?
Use an approved overwrite utility to perform a secure wipe of storage devices.
Encrypt the data on the drives without overwriting the original files.
Delete the files and then empty the recycle bin or trash folder on all devices used.
Format the drives on which sensitive data is stored.