Which of the following BEST ensures that a firewall is configured in compliance with an enterprise’s security policy?
A . Interview the firewall administrator.
B . Review the actual procedures.
C . Review the device’s log file for recent attacks.
D . Review the parameter settings.
Answer: D
Explanation:
A review of the parameter settings will provide a good basis for comparison of the actual configuration to the security policy and will provide reliable audit evidence documentation.
Incorrect Answers:
A: While interviewing the firewall administrator may provide a good process overview, it does not reliably confirm that the firewall configuration complies with the enterprise’s security policy.
B: While procedures may provide a good understanding of how the firewall is supposed to be managed, they do not reliably confirm that the firewall configuration complies with the enterprise’s security policy.
C: While reviewing the device’s log file for recent attacks may provide indirect evidence about the fact that logging is enabled, it does not reliably confirm that the firewall configuration complies with the enterprise’s security policy.