An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
Which phase of the cloud data life cycle involves the process of crypto-shredding?