Documenting a network is essential in troubleshooting and support. Discuss the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?
Discuss how long an upgraded hardware and software components should be stored in case there is a need to back out and reinstall. What considerations should be taken into account when determining the appropriate time to discard old or upgrade equipment?