Your company has decided to run a security audit to determine if there are any security holes in your enterprise. During this audit, the security team retrieves two older computers and a broken laser network printer from the warehouse dumpster. The security team connects the hard drives from the two computers and the network printer to a computer equipped with forensic tools. The security team

retrieves PDF files from the network printer hard drive. However, the data on the two older hard drives was inaccessible. What should your company do to remediate the security issue?

A. Update the asset decommissioning procedures.
B. Implement a new change control process.
C. Update the asset reuse procedures.
D. Update the asset maintenance procedures.

A
Explanation: Your company should update the asset decommissioning procedures. The decommissioning procedures for network printers should be updated to ensure that data on the hard drives cannot be retrieved.
The problem is with how the assets are decommissioned, not with the change control process, asset reuse procedures, or asset maintenance procedures.

Computer Science & Information Technology

You might also like to view...

MC Default arguments are defined in the______.

a) function body. b) function def statement. c) function call. d) None of the above.

Computer Science & Information Technology

_______ attributes define how browsers should render the associated elements in Web pages.

A. Prohibited B. Presentational C. Directional D. Specific

Computer Science & Information Technology