List of questions
Question 11 - CLO-002 discussion
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area. To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
A.
Configuration management
B.
Incident management
C.
Resource management
D.
Change management
Your answer:
0 comments
Sorted by
Leave a comment first