nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #413

CERTIFIED-IN-CYBERSECURITY Question #413: Real Exam Question with Answer & Explanation

The correct answer is C: Request for change. The Request for Change is a formal process that involves identifying the nature of the desired change and is the first activity in the Change Management Components (as described in the ISC2 Study Guide, Chapter 5, Module 3). For example, in a software development organization, a

Security Operations

Question

What is the FIRST activity in the Change Management components?

Options

  • AMaking the change
  • BApproval the change
  • CRequest for change
  • DRollback the change

Explanation

The Request for Change is a formal process that involves identifying the nature of the desired change and is the first activity in the Change Management Components (as described in the ISC2 Study Guide, Chapter 5, Module 3). For example, in a software development organization, a developer might identify a bug in the code that needs to be fixed. The developer would then initiate a change request, detailing the nature of the bug and the proposed solution. This request would then be reviewed and, if approved, the change would be implemented. The remaining activities, Making the Change, Approving the Change, and Rolling Back the Change, all occur after the Request for Change. Making the change involves implementing the proposed change, while Approving the change is the process of reviewing and accepting the proposed change. Rolling Back the Change is a contingency plan that comes into play if the implemented change causes unforeseen problems or fails to solve the problem it was intended to solve. It involves returning the system to its pre-change state.

Topics

#Change Management#IT Operations#Security Operations#Process Flow

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions