Question: A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current
A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current firewall to ensure no changes have been made. What does this scenario describe?
Verifying user identity when accessing an OS
Upgrading the interface between computer hardware and the user
Responsibly managing applications
Checking baseline configuration
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
