Which of the following BEST ensures that a firewall is configured in compliance with an
enterprise’s security policy?
A.
Interview the firewall administrator.
B.
Review the actual procedures.
C.
Review the device’s log file for recent attacks.
D.
Review the parameter settings.
Explanation:
A review of the parameter settings will provide a good basis for comparison of the actual
configuration to the security policy and will provide reliable audit evidence documentation.
Answer B is incorrect. While procedures may provide a good understanding of how the firewall is
supposed to be managed, they do not reliably confirm that the firewall configuration complies with
the enterprise’s security policy.
Answer A is incorrect. While interviewing the firewall administrator may provide a good process
overview, it does not reliably confirm that the firewall configuration complies with the enterprise’s
security policy.
Answer C is incorrect. While reviewing the device’s log file for recent attacks may provide indirectevidence about the fact that logging is enabled, it does not reliably confirm that the firewall
configuration complies with the enterprise’s security policy.