Developers currently have access to update production servers without going through an approval process. Which of the following strategies would BEST mitigate this risk?
A. Incident management
B. Clean desk policy
C. Routine audits
D. Change management
Answer: D. Change management
You might also like to view...
Which of the following is true?
a. You should maintain a separate database connection for each client request. b. You should use a connection pool that allows the server to manage a limited number of database connections and share them among requests. c. You should never connect to databases from web apps. d. None of the above.
Class Arrays methods sort, binarySearch, equals and fill are overloaded for primitive-type arrays and Object arrays. In addition, methods __________ and __________ are overloaded with generic versions.
a. sort, binarySearch. b. sort, fill. c. binarySearch, equals. d. binarySearch, fill.
Every letter in a Java keyword is in lowercase?
a. true b. false
Compute the length of the hypotenuse of a right triangle with a base of 2 feet and an altitude of 3 feet.
What will be an ideal response?