With change control in place, changes usually have to pass through ________

A) the disaster recovery team B) IT
C) upper management D) the change control board

D

Computer Science & Information Technology

You might also like to view...

What is the second step in the Security System Development Life Cycle?

A. Acquire/Develop B. Implement or Assess C. Operate/Maintain D. Dispose

Computer Science & Information Technology

When the ____________________ reports that the end tag for an element is missing, this indicates that either a two-sided tag is missing an end tag or a one-sided tag was improperly entered.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology