PrepAway - Latest Free Exam Questions & Answers

Which element of Configuration Management listed below involves the use of Configuration Items (CIs)?

Which element of Configuration Management listed below involves the use of Configuration Items
(CIs)?

PrepAway - Latest Free Exam Questions & Answers

A.
Configuration Identification

B.
Configuration Control

C.
Configuration Audit

D.
Configuration Accounting

Explanation:
Configuration management entails decomposing the verification system into identifiable,
understandable, manageable, trackable units known as Configuration Items (CIs). A CI is a uniquely
identifiable subset of the system that represents the smallest portion to be subject to independent
configuration control procedures. The decomposition process of a verification system into CIs is
called configuration identification. CIs can vary widely in size, type, and complexity. Although there
are no hard-and-fast rules for decomposition, the granularity of CIs can have great practical
importancE. A favorable strategy is to designate relatively large CIs for elements that are not
expected to change over the life of the system, and small CIs for elements likely to change more
frequently. *Answer “Configuration Accounting”, configuration accounting, documents the status of
configuration control activities and in general provides the information needed to manage a
configuration effectively. It allows managers to trace system changes and establish the history of any
developmental problems and associated fixes. Answer “Configuration Audit”, configuration audit, is
the quality assurance component of configuration management. It involves periodic checks to
determine the consistency and completeness of accounting information and to verify that all
configuration management policies are being followed. Answer “Configuration Control”,
configuration control, is a means of assuring that system changes are approved before being
implemented, only the proposed and approved changes are implemented, and the implementation
is complete and accurate. Source: NCSC-TG-014-89, Guidelines for Formal Verification Systems.


Leave a Reply