Posted by: Pdfprep
Post Date: November 18, 2020
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?
A . Analyzing how the configuration changes are performed
B . Performing penetration testing
C . Analyzing log files
D . Reviewing the rule base
Answer: B
Leave a Reply