Asset and Change Management Flashcards
1.3 - Explain the importance of change management processes and the impact to security 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources 4.2 - Explain the security implications of proper hardware, software, and data asset management
You work in the procurement department of a retail company. The marketing team requests new promotional banners that cost less than $100. The team needs them quickly for an upcoming event. What is the most appropriate purchasing method in this scenario?
A. Create a purchase order for the banners.
B. Use the company credit card to purchase the banners.
C. Submit a reimbursement request after making the purchase personally.
D. Request emergency approval from senior management.
Correct Answer: B
Explanation:
B: Correct. For low-cost, quick purchases, the company credit card is the most suitable option.
A: Incorrect. Purchase orders are used for larger or more expensive purchases and take time to process.
C: Incorrect. Submitting a reimbursement request is not ideal if a company credit card is available.
D: Incorrect. Emergency approvals are unnecessary for such small purchases.
A software development team needs to purchase an enterprise-grade license for a new development tool costing $5,000. The team asks you, as the procurement specialist, how to proceed. What should you recommend?
A. Use the company credit card to purchase the license.
B. Submit a personal expense report after purchasing the license yourself.
C. Issue a purchase order for the license.
D. Use petty cash to complete the purchase.
Correct Answer: C
Explanation:
C: Correct. A purchase order is the appropriate method for large or expensive purchases like an enterprise-grade software license.
A: Incorrect. A company credit card is typically used for smaller purchases, not large expenses.
B: Incorrect. Employees should not use personal funds for significant purchases.
D: Incorrect. Petty cash is unsuitable for such high-value transactions.
Your company is organizing a training workshop, and the event coordinator urgently needs to purchase a projector because the previous one broke. The purchase needs immediate approval, but it exceeds the limit allowed on the company credit card. What is the best course of action?
A. Use the company credit card and split the payment into smaller amounts.
B. Request emergency approval from senior management to authorize the purchase.
C. Use petty cash to cover the cost.
D. Ask the employee to make the purchase personally and reimburse them later.
Correct Answer: B
Explanation:
B: Correct. Emergency approval from senior management is the best option for urgent, high-cost purchases that exceed standard limits.
A: Incorrect. Splitting payments on the company credit card may not be allowed and can complicate accounting.
C: Incorrect. Petty cash is typically for small, immediate expenses, not for high-cost purchases.
D: Incorrect. Employees should not use personal funds for significant, urgent purchases.
A company is considering allowing employees to use their personal smartphones for work emails and accessing company applications.
Question:
Which mobile device deployment model does this scenario describe?
Options:
A. BYOD
B. COPE
C. CYOD
D. BYOL (Bring Your Own Laptop)
Explanation:
A. BYOD (Bring Your Own Device): This is the correct answer. BYOD explicitly allows employees to use their personally owned devices for work purposes.
B. COPE (Corporate-Owned, Personally Enabled): In COPE, the company provides the devices, even though personal use is allowed.
C. CYOD (Choose Your Own Device): CYOD restricts device choices to a company-approved list.
D. BYOL (Bring Your Own Laptop): This refers to a similar concept for laptops, but the scenario specifically mentions smartphones.
An IT manager at a company wants to ensure high security and standardization for mobile devices used by employees. They decide to provide a company-issued smartphone to each employee while allowing limited personal use.
Question:
Which mobile device deployment model is being implemented?
Options:
A. BYOD
B. COPE
C. CYOD
D. BYOL (Bring Your Own Laptop)
Explanation:
A. BYOD (Bring Your Own Device): BYOD emphasizes employee-owned devices.
B. COPE (Corporate-Owned, Personally Enabled): This is the correct answer. COPE describes company-owned devices with limited personal use allowed.
C. CYOD (Choose Your Own Device): CYOD allows employees to choose from a limited list of company-approved devices.
D. BYOL (Bring Your Own Laptop): This refers to a similar concept for laptops, but the scenario specifically mentions smartphones.
A company wants to provide employees with a choice in their work smartphones while maintaining a high level of control and security. They create a list of four approved smartphone models from which employees can select.
Question:
Which mobile device deployment model is being implemented?
Options:
A. BYOD
B. COPE
C. CYOD
D. All of the above
Explanation:
A. BYOD (Bring Your Own Device): BYOD allows any employee-owned device.
B. COPE (Corporate-Owned, Personally Enabled): COPE involves company-issued devices.
C. CYOD (Choose Your Own Device): This is the correct answer. CYOD allows employees to choose from a pre-approved list of devices.
D. All of the above: Only CYOD aligns with the scenario.
A company is evaluating different mobile device deployment models. They are primarily concerned about the initial cost of implementing the chosen model.
Question:
(Choose Two) Which two deployment models would likely have the highest initial cost for the company?
Options:
A. BYOD
B. COPE
C. CYOD
D. None of the above
Explanation:
A. BYOD (Bring Your Own Device): While initially cheaper, BYOD can have hidden costs related to security and support.
B. COPE (Corporate-Owned, Personally Enabled): This is correct. COPE requires the company to purchase devices for all employees, leading to significant upfront costs.
C. CYOD (Choose Your Own Device): This is correct. CYOD also requires the company to purchase devices, albeit with a limited number of options, resulting in a high initial cost.
D. None of the above: Both COPE and CYOD involve significant initial costs for device procurement.
An employee is concerned about the potential for their personal data to be accessed by their employer.
Question:
(Choose Two) Which three deployment models could potentially raise privacy concerns for the employee?
Options:
A. BYOD
B. COPE
C. CYOD
D. None of the above
Explanation:
A. BYOD (Bring Your Own Device): While employee-owned, BYOD often involves company-installed security software that could potentially monitor employee activity.
B. COPE (Corporate-Owned, Personally Enabled): This is correct. Since the company owns the device, they have greater access to employee data and activity on the device.
C. CYOD (Choose Your Own Device): This is correct. Even though the employee chooses from a limited list, the company still owns the device and can implement monitoring and management tools.
D. None of the above: All three models have the potential for privacy concerns to varying degrees.
A company has a large number of laptops used by employees. They want to track the location of each laptop in real-time and receive alerts if a device is reported lost or stolen.
Question:
Which asset management concept is most relevant to this scenario?
Options:
A. Asset Monitoring
B. Asset Tracking
C. Enumeration
D. Asset Classification
Explanation:
A. Asset Monitoring: While important, basic monitoring might not include real-time location tracking and alerts.
B. Asset Tracking: This is the correct answer. Asset tracking specifically involves using technology to monitor the location and status of physical assets, such as laptops.
C. Enumeration: Enumeration focuses on identifying and counting assets, not necessarily real-time location tracking.
D. Asset Classification: Classification helps categorize assets, not track their location.
d
A company wants to determine the value of its servers and the potential impact of a server failure on business operations.
Question:
Which asset management concept is most relevant to this scenario?
Options:
A. Asset Monitoring
B. Asset Tracking
C. Enumeration
D. Asset Classification
Explanation:
A. Asset Monitoring: Monitoring helps track usage, not necessarily determine the value or impact of an asset.
B. Asset Tracking: Tracking focuses on location and status, not necessarily value or impact.
C. Enumeration: Enumeration identifies and counts assets, but not necessarily their value or impact.
D. Asset Classification: This is the correct answer. Classification helps categorize assets based on criteria like value, which is crucial for assessing potential impact.
An employee loses their company-issued smartphone. The IT department remotely locks the device and wipes all company data.
Question:
Which technology is most likely being utilized in this scenario?
Options:
A. MDM (Mobile Device Management)
B. Asset Tracking System
C. Enumeration Software
D. Data Classification Tool
Explanation:
A. MDM (Mobile Device Management): This is the correct answer. MDM solutions provide features like remote lock, wipe, and data management for mobile devices.
B. Asset Tracking System: While tracking might be used to locate the lost device, MDM provides the remote control functionality.
C. Enumeration Software: Enumeration focuses on identifying and counting assets, not remote control.
D. Data Classification Tool: Data classification helps categorize data sensitivity, not control device functions.
A company wants to ensure that all employees’ laptops are updated with the latest security patches and operating system updates.
Question:
Which technology or process is most likely to help achieve this?
Options:
A. Asset Tracking
B. MDM (Mobile Device Management)
C. Manual Software Updates
D. Employee Training
Explanation:
A. Asset Tracking: Tracking focuses on location, not software updates.
B. MDM (Mobile Device Management): This is the correct answer. MDM solutions allow for remote software distribution, patching, and updates for managed devices.
C. Manual Software Updates: Manual updates are time-consuming and prone to errors.
D. Employee Training: While important, training alone won’t ensure automatic software updates.
An IT department needs to dispose of old hard drives containing sensitive customer data. They want to ensure that the data is completely unrecoverable.
Question:
Which data sanitization method would be most appropriate in this scenario?
Options:
A. Overwriting
B. Degaussing
C. Shredding
D. Cryptographic Erase
Explanation:
A. Overwriting: Overwriting can reduce the risk of data recovery but might not be sufficient for highly sensitive data.
B. Degaussing: This is a strong option for hard drives, as it disrupts the magnetic data.
C. Shredding: Shredding physically destroys the device, making data recovery impossible. This would be the most secure option in this case.
D. Cryptographic Erase: Primarily used for devices with encryption, less effective for older hard drives.
A company needs to dispose of a large number of old laptops. They want to ensure the data is sanitized quickly and efficiently, while still allowing the laptops to be potentially repurposed.
Question:
Which data sanitization method would be most appropriate in this scenario?
Options:
A. Overwriting
B. Degaussing
C. Cryptographic Erase
D. Shredding
Explanation:
A. Overwriting: Can be time-consuming, especially for large drives.
B. Degaussing: Renders the device unusable for storage.
C. Cryptographic Erase: This is the most suitable option. It’s fast, efficient, and allows for potential device repurposing.
D. Shredding: Destroys the device, making repurposing impossible.