The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server. Which of
the following describes the procedure the administrator has performed?
A.
Host software base-lining
B.
File snapshot collection
C.
TPM
D.
ROMDB verification