ISC Related Exams
ISSMP Exam
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
Which of the following is the best method to stop vulnerability attacks on a Web server?
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following? 1.To account for all IT assets 2.To provide precise information support to other ITIL disciplines 3.To provide a solid base only for Incident and Problem Management 4.To verify configuration records and correct any exceptions