A mature organization with legacy information systems has incorporated numerous new processes
and dependencies to manage security as its networks and infrastructure are modernized. The
Chief Information Office has become increasingly frustrated with frequent releases, stating that the
organization needs everything to work completely, and the vendor should already have those
desires built into the software product. The vendor has been in constant communication with
personnel and groups within the organization to understand its business process and capture new
software requirements from users. Which of the following methods of software development is this
organization’s configuration management process using?
A.
Agile
B.
SDL
C.
Waterfall
D.
Joint application development