A systems administrator has made several unauthorized changes to the server cluster that resulted in a major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?

A. Asset Management
B. Change Management
C. Configuration Management
D. Incident Management


Answer: B. Change Management

Computer Science & Information Technology

You might also like to view...

The U.S. Department of Defense started e-commerce

Indicate whether the statement is true or false

Computer Science & Information Technology

When the MessageBox action is executed, the macro is paused so a message can be displayed. Click ________ in order for the macro to continue

A) OK B) Cancel C) Go D) Continue

Computer Science & Information Technology

A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An effective business document should ____.

A. have a professional appearance B. convey its message concisely C. convey its message clearly D. all of the above

Computer Science & Information Technology