Which measure is recommended for safeguarding computer equipment when not in use?

Achieve your Certified Ethical Hacker Certification (CEHv10). Prepare with questions, flashcards, and detailed explanations to master the exam topics and succeed in your cybersecurity career.

Locking servers and workstations when they are not in use is a critical security measure for safeguarding computer equipment. This practice involves implementing physical and logical security controls by requiring authentication to access devices. Locking the equipment helps prevent unauthorized physical access, reducing the risk of tampering, theft, or data breaches.

When servers and workstations are left unlocked, they can be easily accessed by individuals who may have malicious intent, leading to potential compromising of sensitive information or disruption of services. By locking the devices, you ensure that only authorized personnel can gain access, thereby protecting the integrity and confidentiality of the data stored on them.

In contrast, securing equipment by shifting it to a secure location can be impractical for regular operations and may not be feasible for devices that require constant uptime. Disconnecting from the internet can limit functionality and may not prevent physical access to the equipment. Notifying the IT department is important for overall security management, but it does not actively safeguard the equipment itself.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy