正解:B
Comprehensive and Detailed Step-by-Step Explanation:
Unauthorized code deployment presents acritical security and operational risk.
* Option A (Incorrect):Whiledocumentation issuescan cause confusion, they do not directlyjeopardizesecurity or system stability.
* Option B (Correct):Deploying code without authorizationbypasseschange management controls, potentially leading to security vulnerabilities, system failures, or compliance violations. This is thegreatest risk.
* Option C (Incorrect):Overwriting files can cause issues but isless severethan unauthorized deployment, which may introducemalware or untested features.
* Option D (Incorrect):An unresolved bug may causeperformance issues, butunauthorized deploymentposes a higher security and compliance risk.
Reference:ISACA CISA Review Manual -Domain 3: Information Systems Acquisition, Development, and Implementation- Covers change management, release processes, and risk assessment.