Your company has decided to run a security audit to determine if there are any security holes in your enterprise. During this audit, the security team retrieves two older computers and a broken laser network printer from the warehouse dumpster. The security team connects the hard drives from the two computers and the network printer to a computer equipped with forensic tools. The security team
retrieves PDF files from the network printer hard drive. However, the data on the two older hard drives was inaccessible. What should your company do to remediate the security issue?
A. Update the asset decommissioning procedures.
B. Implement a new change control process.
C. Update the asset reuse procedures.
D. Update the asset maintenance procedures.
A
Explanation: Your company should update the asset decommissioning procedures. The decommissioning procedures for network printers should be updated to ensure that data on the hard drives cannot be retrieved.
The problem is with how the assets are decommissioned, not with the change control process, asset reuse procedures, or asset maintenance procedures.
You might also like to view...
When using Java's built-in monitors, every object has a(n) ________ or a(n) ________ that the monitor ensures is held by a maximum of only one thread at any time.
a. monitor lock, intrinsic lock b. built-in lock, free lock c. mutual exlcusion lock, synchronization lock d. None of the above.
In client/server mode, each __________ module performs a single service such as a file service, a memory service, and so on.
a. kernel b. resident c. client d. server
The ____ filter is used to fix lens flaws, distortions, and errors in photos.
a. Barrel b. Chromatic c. Keystone d. Lens Correction
An ISO image file uses what format to store a disc's contents in a single file on a computer?
A. Binary format (BIN) B. Disc encoded structure format C. ISO 9660 D. ISO 1040