An administrator edits the network firewall configuration. After editing the configuration, the
administrator logs the date and time of the edit and why it was performed in the firewall
documentation. Which of the following BEST describes these actions?
A.
Asset management
B.
Baselines
C.
Network maps
D.
Change management