To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
A cloud administrator for an ISP identified a vulnerability in the software that controls all the firewall rules for a geographic area.
To ensure the software upgrade is properly tested, approved, and applied, which of the following processes should the administrator follow?
A . Configuration management
B . Incident management
C . Resource management
D . Change management
Answer: A
Latest CLO-002 Dumps Valid Version with 143 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments
                 
	