A capacity upgrade to a production vSAN 7.0 U1 cluster will provide an administrator with a number of SSD storage devices that can be reused in the development vSAN Cluster.
The company security policy mandates the following:
• All data must be encrypted-at-rest.
• All data on all drives must be securely erased before being removed and reused.
Which two steps should the administrator take to ensure that all data on the storage devices is securely erased? (Choose two.)