Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?
A . Analyzing how the configuration changes are performed
B . Performing penetration testing
C . Analyzing log files
D . Reviewing the rule base

Answer: B

Leave a Reply

Your email address will not be published.