5 Questions
What is the primary concern when decommissioning laptops used for handling sensitive data?
Compliance with regulations
What is the main objective when decommissioning laptops used for handling sensitive data?
Ensuring data security and compliance
Which of the following is NOT a recommended step when decommissioning laptops used for handling sensitive data?
Performing a software update
Why is it essential to initiate a secure data destruction process when decommissioning laptops used for handling sensitive data?
To prevent data breaches
What should be the primary step before repurposing or disposing of decommissioned laptops used for handling sensitive data?
Initiating a secure data destruction process
Study Notes
Data Security and Compliance
- When decommissioning laptops used for handling sensitive data, the primary step to ensure data security and compliance with regulations is to initiate a secure data destruction process.
- This step is crucial before repurposing or disposing of these devices.
- Other options, such as conducting a hardware audit, removing all software applications, and deleting all user accounts, are not the primary step in this scenario.
This quiz tests your knowledge on the primary step to ensure data security and compliance with regulations when repurposing or disposing of devices used for handling sensitive data.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free