ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 383 - SK0-005 discussion

Report
Export

Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?

A.
Cancelled change request
Answers
A.
Cancelled change request
B.
Change request postponement
Answers
B.
Change request postponement
C.
Emergency change request
Answers
C.
Emergency change request
D.
Privilege change request
Answers
D.
Privilege change request
E.
User permission change request
Answers
E.
User permission change request
Suggested answer: C

Explanation:

An emergency change request is a type of change request that is initiated in response to an urgent situation, such as a system breach, that requires immediate action to restore normal operations or prevent further damage. An emergency change request may bypass some of the normal change management procedures, such as approval, testing, or documentation, in order to expedite the implementation of the change. However, an emergency change request should still follow the basic steps of change management, such as identification, analysis, planning, execution, and evaluation, and should be reviewed and documented after the change is completed.

References:CompTIA Server+ Study Guide, Chapter 11: Change Management, page 443.

asked 02/10/2024
Lionel CHOLEZ
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first