The ____ is primarily responsible for ensuring that configuration management practices are effective, and that security controls built into the process identify and mitigate any vulnerabilities induced during the lifecycle of the system.
A. IT security compliance officer
B. IT security of operations professional
C. digital forensics professional
D. IT risk professional
Answer: B
Computer Science & Information Technology