List of questions
Related questions
Question 309 - CISSP discussion
Which of the following describes the BEST configuration management practice?
A.
After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B.
After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C.
The firewall rules are backed up to an air-gapped system.
D.
A baseline configuration is created and maintained for all relevant systems.
Your answer:
0 comments
Sorted by
Leave a comment first