100% Free Exams (No login or credit card required)

Section 4.2

Demonstrate your acquired knowledge about the security implications of proper hardware, software,
and data asset management. This will demonstrate your proficiency for section 4.2 of the Security+ SY0-701 objectives.

1 / 25

Regularly reviewing asset records against physical devices prevents:

2 / 25

Failing to certify disposal can result in:

3 / 25

Logging when hardware is moved or reassigned is critical for:

4 / 25

Removing software no longer needed on servers is part of:

5 / 25

A centralized database of every acquired asset supports:

6 / 25

Ensuring all storage media are wiped before resale is:

7 / 25

Not recording who has a device increases the risk of:

8 / 25

Tracking software versions across servers is an example of:

9 / 25

Holding onto obsolete records longer than necessary may violate:

10 / 25

A certificate confirming the drive was shredded is part of:

11 / 25

Which step prevents data recovery from old backups?

12 / 25

Securely retiring cloud VM images requires prior:

13 / 25

Automated scripts that remove obsolete accounts help enforce:

14 / 25

Retaining logs beyond required periods introduces:

15 / 25

Providing a signed statement after disposal proves:

16 / 25

Physically shredding disks is an example of:

17 / 25

Wiping all data from a decommissioned hard drive is:

18 / 25

Failing to enumerate rogue assets can lead to:

19 / 25

Network scanning to discover unmanaged devices is called:

20 / 25

Keeping an up-to-date list of all workstations is part of:

21 / 25

Marking files “Restricted” means they require:

22 / 25

Labeling data by sensitivity level is known as:

23 / 25

Documenting who is responsible for each device ensures clear:

24 / 25

A secure procurement policy should require vendors to demonstrate:

25 / 25

Before purchasing new servers, organizations should first:

Your score is

The average score is 0%

0%