A technician is preparing to dispose of old network devices.
Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?
A . System life-cycle procedures
B . Off-boarding procedures
C . Safety procedures
D . Appropriate use policy
Answer: B
Latest N10-007 Dumps Valid Version with 601 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund