Question 1: Imagine you are the CISO of a large organization. Analyze change and configuration management and explain why it is important in regard to computer operations. Justify your response by including two examples of changes introduced to networks.
Question 2: From the e-Activity, evaluate the organization's security policies from your findings and make a suggestion to improve at least one of these policies. Support your response and cite all sources.