3. Categorize the information to be disposed of.
4. Assess the nature of the medium on which it is recorded.
a. 1, 2, 3, and 4
b. 2, 3, 4, and 1
c. 3, 4, 1, and 2
d. 4, 3, 2, and 1
105. All the following are examples of normal backup strategies
a. Ad hoc backup
b. Full backup
c. Incremental backup
d. Differential backup
106. Regarding a patch management program, which of the following is
a. Developing a remediation plan
b. Installing software patches
c. Adjusting configuration settings
d. Removing affected software
Three types of remediation methods include installing a software patch, adjusting a configuration setting, and removing affected software. Removing affected software requires uninstalling a software application. The fact that a remediation plan is developed does not itself provide actual remediation work because actions provide remediation work not just plans on a paper.
107. For media sanitization, overwriting
1. Damaged media
2. Nondamaged media
3. Rewriteable media
4. Nonrewriteable media
a. 1 only
b. 4 only
c. 1 or 4
d. 2 or 3
108. Regarding media sanitization, which of the following is the correct sequence of fully and physically destroying magnetic disks, such as hard drives?
1. Incinerate
2. Disintegrate
3. Pulverize
4. Shred
a. 4, 1, 2, and 3
b. 3, 4, 2, and 1
c. 1, 4, 3, and 2
d. 2, 4, 3, and 1
Disintegration is a method of sanitizing media and is the act of separating the equipment into component parts. Here, the disintegration step comes first to make the hard drive inoperable quickly. Shredding is a method of sanitizing media and is the act of cutting or tearing into small particles. Shredding cannot be the first step because it is not practical to do for many companies. Pulverization is a method of sanitizing media and is the act of grinding to a powder or dust. Incineration is a method of sanitizing media and is the act of burning completely to ashes done in a licensed incinerator.
Note that one does not need to complete all these methods, but can stop after any specific method and after reaching the final goal based on the sensitivity and criticality of data on the disk.
109. Who initiates audit trails in computer systems?
a. Functional users
b. System auditors
c. System administrators
d. Security administrators