A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?

A. Change management
B. Asset management
C. Access log
D. Baselines


Ans: A. Change management

Computer Science & Information Technology

You might also like to view...

How can you change the brush size of the Spot Removal and Adjustment Brush tools without taking your cursor away from the job at hand?

What will be an ideal response?

Computer Science & Information Technology

Define and describe the media access control method used by Ethernet.

What will be an ideal response?

Computer Science & Information Technology

Anchor points and line segments together are also known as ____.

A. baselines B. curves C. paths D. logos

Computer Science & Information Technology

Which of the following is not a basic function design?

A. Void functions with no parameters. B. Void Functions with parameters C. Functions that have side effects. D. Functions with no parameters that return a value. E. Functions with parameters that return a value.

Computer Science & Information Technology