Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?
A. System life-cycle procedures
B. Off-boarding procedures
C. Safety procedures
D. Appropriate use policy

Exam N10-008: CompTIA Network+

Free dumps for N10-008 in PDF format.

High quality N10-008 PDF and software. VALID exam to help you pass.

comptia-exams

6 thoughts on “Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

  1. I believe the first sentence is a red herring. The question is really focused solely on which policy fulfills this:
    “outline procedures for removing sensitive information and configurations”

    If you ignore what is going on and only answer that question, I believe that leads you to offboarding.
    (This took me some thought to figure out their reasoning.)

      1. Equipment and Data concerning the personnel offboarding. In this question it is never stated that the sensitive information will be removed because the person using the equipment is leaving the organization. The correct answer can only be A

  2. I think the right answer to this question is (A): System life-cycle procedures. The phases of system life-cycle include
    – Conceptual design
    – Preliminary system design
    – Detail design and development
    – Production and construction
    – Utilization and support
    – Phase-out
    – Disposal

    19
    1

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.