nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #159

CERTIFIED-IN-CYBERSECURITY Question #159: Real Exam Question with Answer & Explanation

The correct answer is D: To guarantee that system changes are performed without negatively affecting business. The primary goal of a Change Management Policy is to realize the benefits of the system's changes while minimizing disruptions to business operations, namely by ensuring the integrity of the organization's systems and processes (see ISC2 Study Guide, chapter 5, module 3). Guarant

Security Operations

Question

What is the primary goal of a Change Management Policy?

Options

  • ATo standardize the creation of the organization's network and computer systems
  • BTo guarantee that systems are up to date with the latest security patch
  • CTo standardize the usage of the organization's network and computer systems
  • DTo guarantee that system changes are performed without negatively affecting business

Explanation

The primary goal of a Change Management Policy is to realize the benefits of the system's changes while minimizing disruptions to business operations, namely by ensuring the integrity of the organization's systems and processes (see ISC2 Study Guide, chapter 5, module 3). Guaranteeing that systems have the latest security patches is the goal of a Patch Management Policy. A Networking Policy governs the usage of networks, and an Acceptable Use Policy governs the usage of computer systems. The creation of networks and computer systems in an organization is governed by the following: Networking standards: cover the protocols, technologies, and practices used to create and operate networks, including local area networks (LANs), wide area networks (WANs) and the internet; System development standards: guide the design, development and maintenance of both software and computer systems

Topics

#Change Management#IT Operations#Policy#Business Continuity

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions