CompTIA Network+ Exam N10-007: Technician Violated Policies

Technician Violated Policies: N10-007 Exam Question

Prev Question Next Question

Question

A technician discovered a company computer had a virus but was unable to remove it.

The technician decided to erase the hard drive to eliminate the threat.

Which of the following policies did the technician violate?

A.

Data loss prevention B.

Incident response C.

Asset disposal D.

Acceptable use.

A.

Explanations

A technician discovered a company computer had a virus but was unable to remove it.

The technician decided to erase the hard drive to eliminate the threat.

Which of the following policies did the technician violate?

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use.

A.

The policy violated by the technician in this scenario is the "Data Loss Prevention" policy, which is designed to protect sensitive data from being lost, corrupted, or stolen. By erasing the hard drive, the technician effectively deleted all data on the infected computer, including any valuable or confidential information that was stored on it.

Data loss prevention policies typically require the use of backup systems and other measures to ensure that important data is protected and can be recovered in the event of an incident like a virus infection. Erasing a hard drive without first backing up critical data violates this policy and could result in significant data loss and potential legal and financial consequences for the company.

The other policies listed in the answer choices are:

B. Incident response - This policy outlines the procedures for responding to security incidents, such as virus infections, and is intended to minimize the impact of these incidents on the organization.

C. Asset disposal - This policy governs the proper disposal of company assets, including computer equipment and storage devices, to ensure that sensitive data is not inadvertently disclosed or lost.

D. Acceptable use - This policy outlines the acceptable use of company resources, including computers and networks, and is intended to prevent misuse or abuse of these resources by employees.