Which of the following describes the BEST configuration management practice?

Which of the following describes the BEST configuration management practice?

Which of the following describes the BEST configuration management practice?

A.
After installing a new system, the configuration files are copied to a separate back-up system and
hashed to detect tampering.

B.
After installing a new system, the configuration files are copied to an air-gapped system and
hashed to detect tampering.

C.
The firewall rules are backed up to an air-gapped system.

D.
A baseline configuration is created and maintained for all relevant systems.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

twenty + three =