3.
Categorize the information to be disposed of.4.
Assess the nature of the medium on which it is recorded.a.
1, 2, 3, and 4b.
2, 3, 4, and 1c.
3, 4, 1, and 2d.
4, 3, 2, and 1105. All the following are examples of normal backup strategies
a.
Ad hoc backupb.
Full backupc.
Incremental backupd.
Differential backup106. Regarding a patch management program, which of the following is
a.
Developing a remediation planb.
Installing software patchesc.
Adjusting configuration settingsd.
Removing affected softwareThree types of remediation methods include installing a software patch, adjusting a configuration setting, and removing affected software. Removing affected software requires uninstalling a software application. The fact that a remediation plan is developed does not itself provide actual remediation work because actions provide remediation work not just plans on a paper.
107. For media sanitization, overwriting
1.
Damaged media2.
Nondamaged media3.
Rewriteable media4.
Nonrewriteable mediaa.
1 onlyb.
4 onlyc.
1 or 4d.
2 or 3108. Regarding media sanitization, which of the following is the correct sequence of fully and physically destroying magnetic disks, such as hard drives?
1.
Incinerate2.
Disintegrate3.
Pulverize4.
Shreda.
4, 1, 2, and 3b.
3, 4, 2, and 1c.
1, 4, 3, and 2d.
2, 4, 3, and 1Disintegration is a method of sanitizing media and is the act of separating the equipment into component parts. Here, the disintegration step comes first to make the hard drive inoperable quickly. Shredding is a method of sanitizing media and is the act of cutting or tearing into small particles. Shredding cannot be the first step because it is not practical to do for many companies. Pulverization is a method of sanitizing media and is the act of grinding to a powder or dust. Incineration is a method of sanitizing media and is the act of burning completely to ashes done in a licensed incinerator.
Note that one does not need to complete all these methods, but can stop after any specific method and after reaching the final goal based on the sensitivity and criticality of data on the disk.
109. Who initiates audit trails in computer systems?
a.
Functional usersb.
System auditorsc.
System administratorsd.
Security administrators