reconfigurations, and patches to enhance its IT service restarts or downtime events.
infrastructure's security and efficiency. The cybersecurity B. Understanding dependencies guides the development of effective backout
analyst must carefully analyze dependencies between plans and downtime contingencies.
services, applications, and interfaces to avoid unintended C. Understanding dependencies supports the development of post-change
outages and disruptions during service restarts or performance monitoring to validate system functionality and quickly detect issues.
downtime events. How does understanding
dependencies impact the change management process?
(Select the three best options.)
After encountering a cyber attack, an organization uses a (C. Technical incorrect)
monitoring solution that automatically restarts services
after it has detected the system has crashed. What type
of functional security control is the company
implementing?
A cyber security analyst wants to reduce the attack C. Trusted Platform Module (TPM)
surface for a computer that contains top secret data. The
analyst installs a cryptoprocessor as a module within the
central processing unit (CPU) on the designated
computer to accomplish this. What type of
cryptoprocessor is the analyst installing?
Prior to implementing new software integrations on the (A. Impact analysis incorrect)
organization's network, a software specialist evaluates the
selected modifications in an environment to ensure the
software works correctly and does not cause issues.
What concept does the specialist observe with a desire
to ensure everything works before implementation?
An organization has an established change management B. They define routine operations or changes, providing detailed instructions to
program that includes standard operating procedures implement them.
(SOPs). It wants to implement changes consistently and
effectively. What role do SOPs play in the change
management process?
After receiving the annual audit results from the Inspector A. Project manager
General's office, a cyber specialist begins identifying C. Team leader
points of contact to implement change management on
numerous flagged processes. Understanding the various
positions tied to change management, which roles would
have ownership in the change management process?
(Select the two best options.)
A systems owner reviews permissions granted to a B. Certificate Revocation Lists (CRL)
targeted team of employees and determines that some
of the employees' accesses are outside their scope of
work. After revoking the certificates, what log does the
owner use to record the changes?