Across
- 3. is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies.
- 4. person who has accumulated great knowledge in a particular field
- 5. Don’t use ______ statements inside the same SQL for update/delete
- 9. meeting to get approval for your change
- 10. is a characteristic of cloud computing that is used to handle the increasing workload by increasing the proportion of resource capacity
- 11. A solution that reduces or eliminates the impact or probability of an incident or problem for which a full resolution is not yet available
- 13. Is referred to an event that leads to disturbances and disruptions in an IT service
- 14. one of the different cloud computing models
Down
- 1. refers to a particular time period in the development procedure after which strictness and severity is observed in the rules required for making changes to the source code
- 2. Make sure ______ are changed at predefined intervals
- 6. _________ management helps plan and manage the change of state of a service in its lifecycle
- 7. time it takes for a request to from client to server and back to the client
- 8. Do plan for a complete _____ before the start of the deployment activity
- 12. For all high priority incidents ___ to be done and action items from ___ should be communicated to all stakeholders
- 15. process to be activated in case of emergencies
