• About Us
  • All Categories
  • Contact
  • Home
  • Our Authors
  • Global Knowledge Blog Global Knowledge Blog

--

  • Home
  • All Categories
  • Our Authors
  • About Us
  • Global Knowledge Blog
  • Home
  • All Categories
  • Our Authors
  • About Us

Cybersecurity Awareness Question of the Week: Selling Online

By James Michael Stewart
September 29, 2014

CyberSecurityAwarenessQOW462952601BWhen selling a used device online, which of the following is the most important?

A. Resetting the device back to factory specs.
B. Securely wiping the personal data.
C. Collecting the original box, manuals, cables and charger.
D. Removing your fingerprints from the surface.

Reveal Answer

Answer: B.

The most important task to perform when selling a used device is to securely wipe your personal data. This is most effective by encrypting the storage first, then using the data wipe features of the device.

Related Course

Cybersecurity Foundations
Fundamentals of Information Systems Security
Social Media Security Professional (SMSP) Prep Course

In this article
  • Certification
  • Cybersecurity
  • cybersecurity
  • cybersecurity best practices
  • National Cybersecurity Awareness Month

Join the Conversation Cancel Reply

Will not be published.

1 comment

  1. Delfi Ramirez 4 years ago Reply

    B. Securely wiping the personal data.


RELATED ARTICLES

  • Ignoring it Won’t Make it Go Away, and What You…

    As an entrepreneur, I have spent the last three years speaking with small‐ and medium-sized business owners about risk and why they need to get serious about the security of...
    By David Willson October 15, 2014
  • Outsourcing Cybersecurity is Only as Good as Your Education

    It seems like just about everything is outsourced these days. But what about when it comes to security concerns? Should we outsource cybersecurity? That's a good question, and like all...
    By Dave Buster October 17, 2017
  • Applying the Four Standards of Security-Based CIA

    Constant change in the technology landscape has been mirrored by the steady evolution of information security. The current information system environment is increasingly complex, comprising storage, servers, LANs/WANs, workstations, Unified...
    By Kerry Doyle August 29, 2013

CONNECT WITH US

CATEGORIES

Back to top

© 2018 Global Knowledge Training LLC. All Rights Reserved.  Site Admin | Logout