A company has gone through several upgrades on their network but unfortunately have no way of identifying who approved the upgrades. Which of the following should be implemented to track this type of work?
A. Change management
B. Asset management
C. Access log
D. Baselines
Ans: A. Change management
Computer Science & Information Technology
You might also like to view...
How can you change the brush size of the Spot Removal and Adjustment Brush tools without taking your cursor away from the job at hand?
What will be an ideal response?
Computer Science & Information Technology
Define and describe the media access control method used by Ethernet.
What will be an ideal response?
Computer Science & Information Technology
Anchor points and line segments together are also known as ____.
A. baselines B. curves C. paths D. logos
Computer Science & Information Technology
Which of the following is not a basic function design?
A. Void functions with no parameters. B. Void Functions with parameters C. Functions that have side effects. D. Functions with no parameters that return a value. E. Functions with parameters that return a value.
Computer Science & Information Technology