List of questions
Related questions
Question 390 - SK0-005 discussion
Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
A.
Cancelled change request
B.
Change request postponement
C.
Emergency change request
D.
Privilege change request
E.
User permission change request
Your answer:
0 comments
Sorted by
Leave a comment first