ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 309 - CISSP discussion

Report
Export

Which of the following describes the BEST configuration management practice?

A.
After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
Answers
A.
After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B.
After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
Answers
B.
After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C.
The firewall rules are backed up to an air-gapped system.
Answers
C.
The firewall rules are backed up to an air-gapped system.
D.
A baseline configuration is created and maintained for all relevant systems.
Answers
D.
A baseline configuration is created and maintained for all relevant systems.
Suggested answer: D
asked 18/09/2024
Yusuf E
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first