An organization discovers changes to firewall rules that deviate from documented settings over an extended period. Which practice best addresses these unplanned modifications and ensures device rules align with established guidelines?
Rely on a separate network to handle administrative connections
Maintain a version-controlled baseline and run automated compliance checks
Perform audits of device configurations once a month
Version control combined with automated checks provides continuous tracking of network device parameters and alerts when variations occur. This helps retain an authoritative record of approved configurations. Manual audits on a set schedule overlook changes that take place between checks. Relying on a separate network for administrative traffic does not verify changes within device parameters. Running vulnerability scans on a fixed schedule highlights known weaknesses but does not monitor incremental changes to rules.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is version control in the context of network device configurations?
Open an interactive chat with Bash
What are automated compliance checks, and how do they work?
Open an interactive chat with Bash
Why are manual audits insufficient to track configuration changes?