Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?
A. Audit management
B. Mobile device management
C. Incident management
D. Change management
Answer: D. Change management
You might also like to view...
What is the purpose of a hypervisor?
What will be an ideal response?
All computer programs, no matter how simple or how complex, are written using one or more of three basic structures: sequence, selection, and repetition.
Answer the following statement true (T) or false (F)
What network device (found on every computer connected to a network) creates outgoing frames and destroys incoming frames that do not have a destination address that matches the address of the device?
What will be an ideal response?
A(n) ____________________ group is a collection of two or more selected worksheets.
Fill in the blank(s) with the appropriate word(s).