Question 51
You work as a senior project manager in SoftTech Inc. You are working on a software project using configuration management. Through configuration management, you are decomposing the verification system into identifiable, understandable, manageable, traceable units that are known as Configuration Items (CIs).
According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
According to you, which of the following processes is known as the decomposition process of a verification system into Configuration Items?
Question 52
Which of the following global (Tier 1) policies de?nes what speci?cally the policy is going to address?
Question 53
Which of the following tests ensures that the organization complies with the requirements of the disaster recovery plan?
Question 54
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
Question 55
Which of the following plans provides procedures for recovering business operations immediately following a disaster?
