What should a financial services company do when decommissioning servers with sensitive financial information, considering the need for secure data destruction, regulatory compliance, and environmental sustainability?
CompTIA Security + (Part 1)

Flashcard
•
Computers
•
12th Grade
•
Hard

Naquai Roundtree
FREE Resource
Student preview

24 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Back
Degaussing the servers, rendering the data irretrievable, followed by reselling or recycling the servers after certification.
Answer explanation
Degaussing effectively destroys data by demagnetizing the drives, ensuring irretrievability. This method aligns with the company's data protection policy and allows for environmentally responsible reselling or recycling after certification.
2.
FLASHCARD QUESTION
Front
A group of threat actors disrupts the online services of an oil company due to their disagreement with the company's environmental policies. They believe their actions can force the company to change its practices. This type of threat actor is primarily driven by what kind of motivation?
Back
Political/philosophical beliefs
Answer explanation
The threat actors are motivated by their political/philosophical beliefs regarding environmental policies, aiming to influence the company's practices through disruption.
3.
FLASHCARD QUESTION
Front
What is the primary role of the Change Management Board (CMB) in the educational institution's digital transformation project?
Back
Assessing, approving, and managing changes in the IT infrastructure
Answer explanation
The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.
4.
FLASHCARD QUESTION
Front
What is the primary role of the Change Management Board (CMB) in the educational institution's digital transformation project?
Back
Assessing, approving, and managing changes in the IT infrastructure
Answer explanation
The primary role of the Change Management Board (CMB) is to assess, approve, and manage changes in the IT infrastructure, ensuring a smooth transition to the digital learning system.
5.
FLASHCARD QUESTION
Front
What configuration consideration can ensure that systems and devices within an organization's network adhere to mandatory security configurations?
Back
Configuration enforcement
Answer explanation
Configuration enforcement ensures that all systems and devices comply with mandatory security settings, preventing unauthorized changes and maintaining security integrity, especially after a data exfiltration incident.
6.
FLASHCARD QUESTION
Front
What is the primary advantage of using a CSR and a third-party CA for obtaining digital certificates compared to other methods?
Back
Digital certificates obtained through a Certificate Signing Request and a third-party Certificate Authority have a higher level of trust and recognition within the industry.
Answer explanation
Digital certificates from a CSR and third-party CA are widely recognized and trusted, enhancing security and credibility within the industry compared to self-signed certificates or internal CAs.
7.
FLASHCARD QUESTION
Front
CloudSecure is facing a cybersecurity challenge where some of its critical software applications are no longer supported by vendors, making them vulnerable to potential exploits. The IT team is exploring various strategies to mitigate the risk posed by these unsupported apps. What’s the MOST effective approach to enhance the security posture?
Back
Isolating the unsupported apps from other systems to reduce the attack surface.
Answer explanation
Isolating the unsupported apps reduces their exposure to potential attacks, effectively minimizing the risk. This approach is more secure than ignoring vulnerabilities or consolidating systems, which could increase risk.
Create a free account and access millions of resources
Similar Resources on Quizizz
16 questions
4.0 and 5.0 Networking Test

Flashcard
•
12th Grade
15 questions
Cyber Security Awareness Challenge

Flashcard
•
KG - University
20 questions
Counter measures to mitigate cyber security threats

Flashcard
•
11th Grade
15 questions
016_Obfuscation - CompTIA Security+ SY0-701 - 1.4

Flashcard
•
12th Grade
18 questions
CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

Flashcard
•
12th Grade
20 questions
Basic Communication Information System

Flashcard
•
KG - University
19 questions
Access Control Methods

Flashcard
•
KG - University
15 questions
WH QUESTIONS - TECHNOLOGY

Flashcard
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade