The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server. Which of
the following describes the procedure the administrator has performed?
A.
 Host software base-lining
B.
 File snapshot collection
C.
 TPM
D.
 ROMDB verification