Exam 21: Change Management
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Change control prevents inadvertent overwriting of critical reference data.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
What are the concepts of the capability maturity model integration?
Free
(Essay)
4.8/5
(30)
Correct Answer:
Once proper management oversight exists,the company will be able to use CMMI to help the organization move from ad hoc activities to a disciplined software management process.CMMI relies heavily on change management to provide organizations with the capability to improve their software processes.
What are the essential elements of change management?
Free
(Essay)
4.8/5
(34)
Correct Answer:
Configuration identification identifies assets that need to be controlled.Configuration control keeps track of changes to configuration items that have been baselined.Configuration status accounting tracks each configuration item in the baseline.Configuration auditing verifies the configuration items are built and maintained appropriately.
Configuration status _______________ consists of the procedures for tracking and maintaining data relative to each configuration item in the baseline.
(Short Answer)
4.8/5
(30)
How does the principle of "separation of duties" apply to change management?
(Essay)
4.9/5
(32)
A(n)_________ is used by the change control board to track changes.
(Multiple Choice)
4.9/5
(30)
Change management and configuration management are two very different processes.
(True/False)
4.8/5
(38)
A(n)______________ is used to track changes through the change control board.
(Short Answer)
4.9/5
(39)
A configuration item is an asset that needs to be controlled or managed.
(True/False)
4.9/5
(33)
Upon manager approval,the _______________ moves the executable to the production system.
(Short Answer)
4.8/5
(23)
________________ serves as a foundation for comparison or measurement.
(Multiple Choice)
5.0/5
(31)
Change management is only needed in the development and testing phases of the systems life cycle.
(True/False)
4.8/5
(21)
_______________ refers to a standard methodology for performing and recording changes during software development and system operation.
(Short Answer)
4.8/5
(27)
_______________ is the process of controlling changes to items that have been baselined.
(Short Answer)
4.7/5
(32)
Change management is the process of changing the middle managers in a company during a merger.
(True/False)
4.8/5
(27)
Despite all the benefits from separation of duties,the biggest disadvantage is that the people who know the software best (the developers,designers,and testers)are not the ones that install and administer the software.
(True/False)
4.8/5
(24)
Showing 1 - 20 of 35
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)