Q: 1
Sarah, a forensic investigator, is conducting a post-compromise investigation on a company’s server
that contains sensitive dat
a. To ensure the deleted files do not fall into the wrong hands, she follows a media sanitization
procedure. The process involves overwriting the deleted data 6 times with alternating sequences of
0x00 and 0xFF, followed by a final overwrite using the pattern 0xAA.
Which of the following media sanitization standards has Sarah followed in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.