Section 4.2 Demonstrate your acquired knowledge about the security implications of proper hardware, software,and data asset management. This will demonstrate your proficiency for section 4.2 of the Security+ SY0-701 objectives. 1 / 25 Regularly reviewing asset records against physical devices prevents: Data encryption Rogue equipment Faster sanitization Ownership confusion 2 / 25 Failing to certify disposal can result in: Faster procurement Compliance violations Improved enumeration Better classification 3 / 25 Logging when hardware is moved or reassigned is critical for: Destruction Asset accounting Classification Sanitization 4 / 25 Removing software no longer needed on servers is part of: Enumeration Hardening Classification Data retention 5 / 25 A centralized database of every acquired asset supports: Destruction Accountability Sanitization Enumeration 6 / 25 Ensuring all storage media are wiped before resale is: Enumeration Sanitization enforcement Classification check Procurement step 7 / 25 Not recording who has a device increases the risk of: Proper disposal Unauthorized use Faster enumeration Better classification 8 / 25 Tracking software versions across servers is an example of: Sanitization Asset monitoring Destruction Ownership assignment 9 / 25 Holding onto obsolete records longer than necessary may violate: Sanitization standards Data-retention policies Inventory accuracy Enumeration rights 10 / 25 A certificate confirming the drive was shredded is part of: Enumeration Destruction certification Asset assignment Procurement review 11 / 25 Which step prevents data recovery from old backups? Enumeration Encryption before destruction Classification Inventory update 12 / 25 Securely retiring cloud VM images requires prior: Classification Enumeration Data sanitization Ownership logging 13 / 25 Automated scripts that remove obsolete accounts help enforce: Procurement policy Sanitization Data retention rules Enumeration 14 / 25 Retaining logs beyond required periods introduces: Improved enumeration Regulatory risk Faster disposal Better classification 15 / 25 Providing a signed statement after disposal proves: Inventory accuracy Certification of destruction Ownership transfer Retention compliance 16 / 25 Physically shredding disks is an example of: Data retention Destruction Inventory Acquisition 17 / 25 Wiping all data from a decommissioned hard drive is: Deletion Sanitization Enumeration Classification 18 / 25 Failing to enumerate rogue assets can lead to: Over-retention of data Unmonitored attack vectors Excessive disposal cost Missing ownership records 19 / 25 Network scanning to discover unmanaged devices is called: Ownership assignment Enumeration Classification Sanitization 20 / 25 Keeping an up-to-date list of all workstations is part of: Disposal certification Inventory tracking Procurement review Data retention 21 / 25 Marking files “Restricted” means they require: Regular snapshots Strict access controls Offsite disposal Enumeration logs 22 / 25 Labeling data by sensitivity level is known as: Inventory management Classification Asset sanitization Ownership tagging 23 / 25 Documenting who is responsible for each device ensures clear: Tracking schedules Sanitization steps Ownership accountability Enumeration methods 24 / 25 A secure procurement policy should require vendors to demonstrate: Inventory schedules Supply-chain security controls Data-retention periods Destruction certification 25 / 25 Before purchasing new servers, organizations should first: Classify existing data Sanitize old hardware Conduct procurement risk assessment Enumerate network assets Your score isThe average score is 0% 0% Restart quiz Return to CompTia S+ SY0-701 Objectives