Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one
Continuous Monitoring is the fourth phase of the security certification and accreditation process.
The Continuous Monitoring process consists of the following three main activities:
Configuration management and control Security control monitoring and impact analyses of changes
to the information system Status reporting and documentation The objective of these tasks is to
observe and evaluate the information system security controls during the system life cycle. These
tasks determine whether the changes that have occurred will negatively impact the system security.
Answer options E and D are incorrect. Security accreditation decision and security accreditation
documentation are the two tasks of the security accreditation phase.
Dylan
3 months agoOdelia
3 months agoQueen
4 months agoThora
4 months agoAnissa
4 months agoDana
4 months agoDelmy
4 months agoShalon
4 months agoZack
5 months agoNgoc
5 months agoMarguerita
5 months agoAlline
5 months agoFreida
5 months agoKenny
5 months agoLynette
5 months agoDorathy
5 months agoJustine
10 months agoNakisha
10 months agoHildred
9 months agoNadine
9 months agoCasie
9 months agoLashanda
10 months agoMarvel
10 months agoNarcisa
10 months agoSarah
9 months agoChandra
9 months agoLinsey
9 months agoIzetta
9 months agoPamella
9 months agoErinn
9 months agoIluminada
9 months agoLemuel
9 months agoDeeanna
10 months agoLashanda
10 months agoJamal
10 months agoLindsey
11 months agoJeannine
11 months agoMarguerita
9 months agoSilvana
9 months agoSage
9 months agoElvera
9 months agoRikki
10 months agoChristiane
10 months agoMicah
10 months agoAlex
11 months ago