nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #266

CERTIFIED-IN-CYBERSECURITY Question #266: Real Exam Question with Answer & Explanation

The correct answer is B: Baseline configuration. A baseline configuration provides secure configuration templates for operating systems and applications, which can help system administrators ensure that systems are configured securely and according to industry best practices. Security guidelines are general recommendations or b

Security Operations

Question

What instrument assists system administrators by providing secure configuration templates for operating systems and applications?

Options

  • ASecurity guidelines
  • BBaseline configuration
  • CRunning configuration
  • DSecurity policy

Explanation

A baseline configuration provides secure configuration templates for operating systems and applications, which can help system administrators ensure that systems are configured securely and according to industry best practices. Security guidelines are general recommendations or best practices for securing systems, while a security policy outlines an organization's overall approach to security. A running configuration is the current configuration of a system, which may or may not be secure. Baseline configuration is an essential tool to maintain the security of an organization's IT infrastructure.

Topics

#Baseline Configuration#System Hardening#Configuration Management#Security Controls

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions