Question: in reviewing the configurations on a computer what steps should the security analyst undertake to effectively audit the current configurations and properly document the chnages
in reviewing the configurations on a computer what steps should the security analyst undertake to effectively audit the current configurations and properly document the chnages made? review logs to identify changes conduct penetration testing document detailed change log and rationale compare current configuration with known good baseline perform a risk assessment.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
