Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one
Continuous Monitoring is the fourth phase of the security certification and accreditation process.
The Continuous Monitoring process consists of the following three main activities:
Configuration management and control Security control monitoring and impact analyses of changes
to the information system Status reporting and documentation The objective of these tasks is to
observe and evaluate the information system security controls during the system life cycle. These
tasks determine whether the changes that have occurred will negatively impact the system security.
Answer options E and D are incorrect. Security accreditation decision and security accreditation
documentation are the two tasks of the security accreditation phase.
Dylan
5 months agoOdelia
5 months agoQueen
5 months agoThora
5 months agoAnissa
5 months agoDana
6 months agoDelmy
6 months agoShalon
6 months agoZack
6 months agoNgoc
6 months agoMarguerita
6 months agoAlline
6 months agoFreida
6 months agoKenny
6 months agoLynette
6 months agoDorathy
6 months agoJustine
11 months agoNakisha
11 months agoHildred
10 months agoNadine
11 months agoCasie
11 months agoLashanda
12 months agoMarvel
12 months agoNarcisa
12 months agoSarah
10 months agoChandra
10 months agoLinsey
10 months agoIzetta
11 months agoPamella
11 months agoErinn
11 months agoIluminada
11 months agoLemuel
11 months agoDeeanna
11 months agoLashanda
12 months agoJamal
12 months agoLindsey
1 year agoJeannine
1 year agoMarguerita
10 months agoSilvana
10 months agoSage
10 months agoElvera
11 months agoRikki
11 months agoChristiane
11 months agoMicah
11 months agoAlex
1 year ago