CISSP-ISSMP Exam: Configuration Management Activities for Scope Changes

Configuration Management Activities for Scope Changes

Question

Part of your change management plan details what should happen in the change control system for your project.

Theresa, a junior project manager, asks what the configuration management activities are for scope changes.

You tell her that all of the following are valid configuration management activities except for which one?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

Configuration management is the process of identifying, organizing, and controlling changes to the configuration of an information system throughout its lifecycle. It is a vital component of change management and is responsible for maintaining the integrity and consistency of the system configuration.

The four primary activities of configuration management are configuration identification, configuration control, configuration status accounting, and configuration verification and auditing. Each of these activities plays a critical role in managing changes to the system's configuration.

Configuration identification involves identifying and documenting the configuration items (CIs) that make up the system, as well as their interrelationships. This information is essential for tracking changes and understanding the impact of those changes on the system's functionality and performance.

Configuration control involves managing changes to the configuration items, ensuring that all changes are authorized, documented, and implemented correctly. This process includes identifying the need for a change, evaluating the impact of the change, and approving or rejecting the change request.

Configuration status accounting involves maintaining accurate records of the configuration items and their current status, including any changes that have been approved or rejected. This information is used to track the system's configuration over time and to support the decision-making process when evaluating change requests.

Configuration verification and auditing involves reviewing the system's configuration and comparing it to the documented baseline to ensure that it is accurate and complete. This process helps to identify any discrepancies or inconsistencies in the system configuration and ensures that the system is operating correctly.

Of the four activities listed, Configuration Item Costing is not a valid configuration management activity. While cost estimates may be necessary for change requests, they are not a fundamental component of configuration management. Configuration Item Costing involves determining the cost of each configuration item, and this falls more under the domain of financial management than configuration management.

In summary, Configuration Identification, Configuration Control, Configuration Status Accounting, and Configuration Verification and Auditing are all valid configuration management activities, but Configuration Item Costing is not.