PdfPrep.com

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?
A . Analyzing how the configuration changes are performed
B . Performing penetration testing
C . Analyzing log files
D . Reviewing the rule base

Answer: B

Exit mobile version