FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The process of establishing and maintaining effective system controls is called:
A
Trusted recovery
B
Standards
C
Security management
D
Configuration management
Explanation: 

Detailed explanation-1: -Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.

Detailed explanation-2: -Configuration Management is the process of maintaining systems, such as computer hardware and software, in a desired state. Configuration Management (CM) is also a method of ensuring that systems perform in a manner consistent with expectations over time.

Detailed explanation-3: -Configuration control: Ensures that all changes to configuration items are controlled. Configuration control of specifications and test plans is vital for quality control to be effective. Configuration status accounting: Provides records and reports that relate to a deliverable and its configuration information.

Detailed explanation-4: -Configuration management can be used to maintain OS configuration files. Example systems include Ansible, Bcfg2, CFEngine, Chef, Nix, Otter, Puppet, Quattor, SaltStack, Terraform, Pulumi and Vagrant. Many of these systems utilize Infrastructure as Code to define and maintain configuration.

Detailed explanation-5: -Configuration management is concerned with the development of procedures and standards for cost-effective managing and controlling changes in an evolving s/w system. It includes software version maintenance, controlling changes in documentation, controlling changes to source code management.

There is 1 question to complete.