A company has gone through several upgrades on their network but unfortunately have no way of
identifying who approved the upgrades. Which of the following should be implemented to track this
type of work?
A.
Change management
B.
Asset management
C.
Access log
D.
Baselines