When a copy is made, the contents of a hard drive are stored as a series of compressed ________ files

Fill in the blank(s) with correct word

image

Computer Science & Information Technology

You might also like to view...

You can prevent hackers from capturing your personal information when using a Wi-Fi hotspot by utilizing a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Your company has decided to run a security audit to determine if there are any security holes in your enterprise. During this audit, the security team retrieves two older computers and a broken laser network printer from the warehouse dumpster. The security team connects the hard drives from the two computers and the network printer to a computer equipped with forensic tools. The security team

retrieves PDF files from the network printer hard drive. However, the data on the two older hard drives was inaccessible. What should your company do to remediate the security issue? A. Update the asset decommissioning procedures. B. Implement a new change control process. C. Update the asset reuse procedures. D. Update the asset maintenance procedures.

Computer Science & Information Technology