TRUE/FALSE
- Change management should only be used in the quality assurance(QA) phase of a system’s life.
- Since developers create and enhance programs, they should beable to install these programs on the production system.
- Most large enterprises rely on a paper-based system problemreport (SPR) process.
- Executable code integrity can be verified using host-basedintrusion detection systems.
- Virtualization can be used as a form of sandboxing with respectto an entire system.
Multiple Choice
6. Which term refers to a preapproved change that is low risk,relatively common and follows a procedure or work instruction?
A. Change
B. Reserve change
C. Standard change
D. Emergency change
7. Which form of configuration auditing verifies that theconfiguration item performs
OR
OR