Which of the following procedures would be used to mitigate the risk of an internal developer embedding malicious code into a production system?

A. Audit management
B. Mobile device management
C. Incident management
D. Change management


Answer: D. Change management

Computer Science & Information Technology

You might also like to view...

What is the purpose of a hypervisor?

What will be an ideal response?

Computer Science & Information Technology

All computer programs, no matter how simple or how complex, are written using one or more of three basic structures: sequence, selection, and repetition.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What network device (found on every computer connected to a network) creates outgoing frames and destroys incoming frames that do not have a destination address that matches the address of the device?

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ group is a collection of two or more selected worksheets.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology