For secure data deletion, one method is overwriting the data with _____.
All of the options
Secure deletion software
Zeros
Random data