Part of your change management plan details what should happen in the change control system for your project. Theresa, a junior project manager, asks what the configuration management activities are for scope changes. You tell her that all of the following are valid configuration management activities except for which one?
Peter is a merchant. He uses symmetric encryption to send confidential messages to different users of his Web site. Which of the following is the other name for asymmetric encryption?
Configuration Management (CM) is an Information Technology Infrastructure Library (ITIL) IT Service Management (ITSM) process. Configuration Management is used for which of the following?
1. To account for all IT assets
2. To provide precise information support to other ITIL disciplines
3. To provide a solid base only for Incident and Problem Management
4. To verify configuration records and correct any exceptions
Your computer continues to operate even if its disk drive has failed. This ability is known as _____.