While is the simplest method for detecting invalid or unauthorized changes?

While is the simplest method for detecting invalid or unauthorized changes?

While is the simplest method for detecting invalid or unauthorized changes?

A.
Complete a weekly reactive review of change control tickets.

B.
Use exception reporting from syslog indicating access to a device in privileged mode and compare this report to the change record to identify possible unauthorized changes

C.
Ensure there is strong policy in place that any violation of change or configuration management processes will result in immediate termination.

D.
Verify the success of network changes



Leave a Reply 0

Your email address will not be published. Required fields are marked *