A systems administrator has made several unauthorized changes to the server cluster that resulted in a major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?
A. Asset Management
B. Change Management
C. Configuration Management
D. Incident Management
Answer: B. Change Management
Computer Science & Information Technology
You might also like to view...
The U.S. Department of Defense started e-commerce
Indicate whether the statement is true or false
Computer Science & Information Technology
An effective business document should ____.
A. have a professional appearance B. convey its message concisely C. convey its message clearly D. all of the above
Computer Science & Information Technology
When the MessageBox action is executed, the macro is paused so a message can be displayed. Click ________ in order for the macro to continue
A) OK B) Cancel C) Go D) Continue
Computer Science & Information Technology
A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology