Posted by: Pdfprep
Post Date: June 2, 2021
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
A . Implementing automated vulnerability scanning
B . Restricting access to configuration documentation
C . Recording changes to configuration files
D . Monitoring against the configuration standard
Answer: D
Leave a Reply