A system administrator has made several unauthorized changes to the server cluster that resulted in a major
outage. This event has been brought to the attention of the Chief Information Office (CIO) and he has
requested immediately implement a risk mitigation strategy to prevent this type of event from reoccurring.
Which of the following would be the BEST risk mitigation strategy to implement in order to meet this request?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Asset Management
B.
Change Management
C.
Configuration Management
D.
Incident Management