Which of the following is the MOST effective control to maintain the integrity of system configuration files?

Posted by: Pdfprep Category: CRISC Tags: , ,

Which of the following is the MOST effective control to maintain the integrity of system configuration files?
A . Implementing automated vulnerability scanning
B . Restricting access to configuration documentation
C . Recording changes to configuration files
D . Monitoring against the configuration standard

Answer: D

Leave a Reply

Your email address will not be published.