Which discipline establishes and maintains the integrity of identified outputs of a project or process and makes them available to stakeholders?

Prepare for the Air Force Cybersecurity Test. Use flashcards and multiple-choice questions with detailed explanations and hints. Ensure success on your exam with tailored study material!

Multiple Choice

Which discipline establishes and maintains the integrity of identified outputs of a project or process and makes them available to stakeholders?

Explanation:
Configuration management focuses on identifying, documenting, and controlling the outputs of a project or process so they stay consistent with their approved baselines. It establishes a baseline for each artifact, tracks any changes through a formal process, and keeps status accounting and audit trails. This ensures the integrity of the deliverables—software, documents, configurations, or other artifacts—and makes the correct, approved versions available to stakeholders when needed. Without this discipline, different teams could end up with divergent copies or configurations, causing confusion and mismatches. Change management governs how changes are requested and approved, group policy manages centralized settings in a Windows environment, and vulnerability management operator concentrates on finding and addressing security flaws.

Configuration management focuses on identifying, documenting, and controlling the outputs of a project or process so they stay consistent with their approved baselines. It establishes a baseline for each artifact, tracks any changes through a formal process, and keeps status accounting and audit trails. This ensures the integrity of the deliverables—software, documents, configurations, or other artifacts—and makes the correct, approved versions available to stakeholders when needed. Without this discipline, different teams could end up with divergent copies or configurations, causing confusion and mismatches. Change management governs how changes are requested and approved, group policy manages centralized settings in a Windows environment, and vulnerability management operator concentrates on finding and addressing security flaws.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy