Search Header Logo

011_Technical Change Management-CompTIA Security+ SY0-701-1.3

Authored by Wayground Content

Computers

12th Grade

Used 3+ times

011_Technical Change Management-CompTIA Security+ SY0-701-1.3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common challenge when dealing with legacy systems in change control?

They often lack developer support

They are always up to date

They are easy to integrate with new systems

They require no documentation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to have a predefined scope in change control?

To ensure that only approved changes are made

To allow for unlimited changes

To increase project costs

To reduce project timelines

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key takeaway regarding the execution of change requests by technicians?

Technicians execute change requests according to predefined scopes.

Technicians can modify change requests at any time.

Technicians are not required to follow any guidelines for change requests.

Technicians must always seek approval before executing any change requests.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential solution for managing changes that require downtime in a 24/7 organization?

Implementing a primary-secondary system

Scheduling maintenance during off-peak hours

Using a cloud-based service

Increasing staff availability during changes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between an allow list and a deny list in terms of application control.

An allow list allows all applications except those explicitly blocked, while a deny list blocks all applications except those explicitly allowed.

An allow list blocks all applications except those explicitly allowed, while a deny list allows all applications except those explicitly blocked.

An allow list and a deny list are the same; both allow all applications by default.

An allow list is used for network access, while a deny list is used for application control.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is documentation important in change control?

It helps in tracking and reverting changes.

It increases the workload of the team.

It makes the process more complicated.

It eliminates the need for communication.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What might be a reason for requiring special handling of legacy applications during change control?

They may have old OS dependencies

They are always more secure

They require less testing

They are easier to update

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?