Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
Degaussing
Which of the following technologies allows one core on the microprocessor to appear as multiple cores to the operating system?
HTT
Which of the following security measures can be applied to a wired SOHO network? (Select all that apply)
Disabling unused ports
MAC filtering