In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?
A) Developers checking out source code without approval
B) Developers using rapid application development (RAD) methodologies without approval
C) Promoting programs to production without approval
D) Modifying source code without approval
Correct Answer:
Verified
Q128: Which of the following is a canon
Q129: Digital certificates used in Transport Layer Security
Q130: What is the purpose of an Internet
Q131: How is Remote Authentication Dial-In User Service
Q132: Which of the following adds end-to-end security
Q134: Which of the following phases involves researching
Q135: Which of the following is a MAJOR
Q136: Which of the following mandates the amount
Q137: Which item below is a federated identity
Q138: A security consultant has been hired by
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents