Ann the IT director wants to ensure that as hoc changes are not making their way to the production applications. Which of the following risk mitigation strategies should she implement in her department?

A. Change management
B. Permission reviews
C. Incident management
D. Perform routine audits

Answer: A. Change management

Computer Science & Information Technology

You might also like to view...

Examples of user data include all of the following EXCEPT

A) Temp files B) User profiles C) Program files D) User passwords

Computer Science & Information Technology

What objections to the use of friend functions and classes do some experts give?

What will be an ideal response?

Computer Science & Information Technology