A systems administrator has made several unauthorized changes to the server cluster that resulted in a major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?
A. Asset Management
B. Change Management
C. Configuration Management
D. Incident Management
Answer: B. Change Management
Computer Science & Information Technology
You might also like to view...
White space is white and void of content
Indicate whether the statement is true or false.
Computer Science & Information Technology
____ are page designs that are available to be applied to pages in the same way that character styles are available to be applied to text.
A. Reusable masters B. Master pages C. Layout masters D. Page spacers
Computer Science & Information Technology