A systems administrator has made several unauthorized changes to the server cluster that resulted in a major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?

A. Asset Management
B. Change Management
C. Configuration Management
D. Incident Management

Answer: B. Change Management

Computer Science & Information Technology

You might also like to view...

White space is white and void of content

Indicate whether the statement is true or false.

Computer Science & Information Technology

____ are page designs that are available to be applied to pages in the same way that character styles are available to be applied to text.

A. Reusable masters B. Master pages C. Layout masters D. Page spacers

Computer Science & Information Technology