Notifications
Clear all
Topic starter
03/11/2022 4:01 am
Which of the following describes the BEST configuration management practice?
- A . After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
- B . After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
- C . The firewall rules are backed up to an air-gapped system.
- D . A baseline configuration is created and maintained for all relevant systems.
Suggested Answer: D