A systems administrator has made several unauthorized changes to the server cluster that resulted in a
major outage. This event has been brought to the attention of the Chief Information Office (CIO) and he
has requested immediately implement a risk mitigation strategy to prevent this type of event from
reoccurring. Which of the following would be the BEST risk mitigation strategy to implement in order to
meet this request?

A.
Asset Management
B.
Change Management
C.
Configuration Management
D.
Incident Management