单选题When disposing of data, which of the following should be considered FIRST?()ACompany policy requirementsBLocal legal requirementsCStorage requirementsDDisposal requirements

单选题
When disposing of data, which of the following should be considered FIRST?()
A

Company policy requirements

B

Local legal requirements

C

Storage requirements

D

Disposal requirements


参考解析

解析: 暂无解析

相关考题:

When disposing of computer equipment, which of the following can present an environmental hazard?() A. BezelB. SATA cableC. Cat5 cableD. CRT monitor

Which of the following commands should be run to verify that file system /data is not corrupted?() A.fsck /dtaB.fsck datavgC.lqueryvg datavgD.stat /data

Which of the following is the MOST important consideration when implementing a data retentio program?()A、 The data destruction requirementsB、 The user awareness training programC、 The laws and legal requirements of the dataD、 The companys individual data retention policies

Which of the following is best practice when disposing of used equipment?()A、Donating to a non-profit groupB、Use a local recycling companyC、Send equipment back to manufacturerD、Following local laws

Two autonomous networks who wish to exchange routing data should use which of the following protocols?()A、OSPFB、BGPC、EIGRPD、IS-IS

Which of the following should be done FIRST to a hard drive before it is disposed?()A、PartitionB、Physical damageC、Data wipeD、Format

Which of the following desktop hardware should a technician be MOST concerned with disposing of correctly?()A、batteriesB、power cordsC、disk drivesD、hard drives

When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

Which of the following is eliminated when using SATA instead of PATA technology?()A、Jumper selectionB、Power connectorC、Data port connectorD、Hard drive LEDs

When disposing of computer equipment, which of the following can present an environmental hazard?()A、BezelB、SATA cableC、Cat5 cableD、CRT monitor

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

At which of the following times should the administrator refer to the HCL?()A、Prior to purchasing hardwareB、Before installationC、When installing driversD、After installation

Which of the following would an administrator follow when disposing of equipment for a financial institution?()A、Local laws and regulationsB、Escalation procedure regulationsC、Manufacturer's regulationsD、Server OEM regulations

A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()A、Recycle the battery.B、Store the battery.C、Place battery in a sealed plastic bag.D、Disassemble the battery.

Which of the following terms is used when printing data on both the front and the back of paper?()A、ScalingB、CopyingC、DuplexD、Simplex

Which of the following commands should be run to verify that file system /data is not corrupted?()A、fsck /dtaB、fsck datavgC、lqueryvg datavgD、stat /data

单选题When installing a hydraulic hose, which of the following precautions should be taken?()AThe hose should not be twistedBThe hose should be protected with a sleeve if it is subjected to rubbingCThere should be some slack in the hoseDAll of the above

单选题Before performing a mksysb system backup, which of the following procedures should a system administrator perform to avoid backing up certain user files?()AAdd the list of files to /etc/exclude.rootvg.BModify the image.data file and add the files to be excluded form the backup.CModify the bosinst.data file and specify which files are to be excluded from the backup.DSpecify the files to be excluded on the command line when executing the mksysb command.

多选题In a design situation, there are multiple character sets that can properly encode your data. Which three should influence your choice of character set?()ASyntax when writing queries involving JOINSBMemory usage when working with the dataCCharacter set mapping index hash sizeDDisk usage when storing data

单选题Which of the following should be updated when new computers are purchased?()AAsset managementBChange managementCCable managementDBaselines

单选题When a student has something in his mind and he should ignore the irrelevant parts when reading, which of the following strategies can be used? _____AskimmingBdetailed readingCscanningDpredicting

单选题Which of the following would an administrator follow when disposing of equipment for a financial institution?()A Local laws and regulationsB Escalation procedure regulationsC Manufacturer’s regulationsD Server OEM regulations

单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.

单选题Which of the following should be avoided when installing a laser printer?()ASurge protectorBUPSCRJ-45 connectorDToner

单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A The data destruction requirementsB The user awareness training programC The laws and legal requirements of the dataD The companys individual data retention policies

单选题Two autonomous networks who wish to exchange routing data should use which of the following protocols?()AOSPFBBGPCEIGRPDIS-IS

单选题Which of the following is best practice when disposing of used equipment?()ADonating to a non-profit groupBUse a local recycling companyCSend equipment back to manufacturerDFollowing local laws

单选题When computers are connected on a network in a manner where the data flows to a central pointand then back out describes which of the following networks?()ARingBMeshCStarDHybrid