Go back to
642-770 - Operational Foundations for Cisco Service Provider Core Networks
While is the simplest method for detecting invalid or unauthorized changes?
Complete a weekly reactive review of change control tickets.
Use exception reporting from syslog indicating access to a device in privileged mode and compare this report to the change record to identify possible unauthorized changes
Ensure there is strong policy in place that any violation of change or configuration management processes will result in immediate termination.
Verify the success of network changes
Want to practice for 642-770 - Operational Foundations for Cisco Service Provider Core Networks ?