Your company has decided to run a security audit to determine if there are any security holes in your enterprise. During this audit, the security team retrieves two older computers and a broken laser network printer from the warehouse dumpster. The security team connects the hard drives from the two computers and the network printer to a computer equipped with forensic tools. The security team

retrieves PDF files from the network printer hard drive. However, the data on the two older hard drives was inaccessible. What should your company do to remediate the security issue?

A. Update the asset decommissioning procedures.
B. Implement a new change control process.
C. Update the asset reuse procedures.
D. Update the asset maintenance procedures.


A
Explanation: Your company should update the asset decommissioning procedures. The decommissioning procedures for network printers should be updated to ensure that data on the hard drives cannot be retrieved.
The problem is with how the assets are decommissioned, not with the change control process, asset reuse procedures, or asset maintenance procedures.

Computer Science & Information Technology

You might also like to view...

When using Java's built-in monitors, every object has a(n) ________ or a(n) ________ that the monitor ensures is held by a maximum of only one thread at any time.

a. monitor lock, intrinsic lock b. built-in lock, free lock c. mutual exlcusion lock, synchronization lock d. None of the above.

Computer Science & Information Technology

In client/server mode, each __________ module performs a single service such as a file service, a memory service, and so on.

a. kernel b. resident c. client d. server

Computer Science & Information Technology

The ____ filter is used to fix lens flaws, distortions, and errors in photos.

a. Barrel b. Chromatic c. Keystone d. Lens Correction

Computer Science & Information Technology

An ISO image file uses what format to store a disc's contents in a single file on a computer?

A. Binary format (BIN) B. Disc encoded structure format C. ISO 9660 D. ISO 1040

Computer Science & Information Technology