ccsp video for which of the following approaches would not be considered sufficient to meet the requirements of secure data destruction within a cloud
Which of the following approaches would not be considered sufficient to meet the requirements of secure data destruction within a cloud environment?