Comptia A+ Core 2 Objective 2.8 – Security – Data Destruction

Posted by:

|

On:

|

Data Destruction

1 / 10

An IT department is decommissioning servers that were used for critical business operations. To mitigate any risk of data breach, which strategy would be most effective for the secure disposal of these servers?

2 / 10

An organization is retiring its multifunction printers that have been used for printing sensitive documents. These printers have internal storage that may contain residual data. Which disposal method ensures the security of the stored data?

3 / 10

You are tasked with preparing a batch of company laptops for resale. The laptops contain sensitive corporate data. Which of the following methods ensures the data cannot be recovered while allowing the laptops to be reused?

4 / 10

An IT technician is tasked with securely disposing of a number of SSDs from company laptops. Given the unique nature of SSDs compared to HDDs, which method ensures the data is completely unrecoverable while adhering to environmental and data protection standards?

5 / 10

During a routine upgrade, an IT technician discovers several SSDs that are no longer functional and cannot be wiped using software tools. The organization must dispose of these SSDs securely to ensure that no data recovery is possible. What is the most appropriate method of disposal?

6 / 10

A healthcare organization needs to dispose of old servers containing protected health information (PHI). To comply with regulations and ensure data privacy, which of the following steps is crucial when outsourcing the destruction of these servers?

7 / 10

A financial institution is outsourcing the disposal of backup tapes that contain sensitive customer information. What is the most important factor to ensure compliance with financial data protection regulations?

8 / 10

A company is retiring a set of external backup drives that have been used for sensitive data storage. The IT department needs to ensure all data is irretrievably destroyed before the drives are sent for recycling. Which combination of methods would best ensure the data cannot be recovered?

9 / 10

An IT security firm needs to dispose of several mobile devices that have suffered irreparable damage, including smartphones and tablets containing encrypted sensitive data. Given that the devices cannot be powered on, what is the best method to ensure data security upon disposal?

10 / 10

Your organization is updating its IT assets and needs to dispose of several defective hard drives that cannot be wiped due to malfunction. Which of the following methods is MOST secure and appropriate for disposing of these drives?

Your score is

Exit