A mature organization with legacy information systems has incorporated numerous new processes and
dependencies to manage security as its networks and infrastructure are modernized. The Chief Information
Office has become increasingly frustrated with frequent releases, stating that the organization needs everything
to work completely, and the vendor should already have those desires built into the software product. The
vendor has been in constant communication with personnel and groups within the organization to understand
its business process and capture new software requirements from users. Which of the following methods of
software development is this organization’s configuration management process using?
A.
Agile
B.
SDL
C.
Waterfall
D.
Joint application development