A security template can be used to perform all but which of the following tasks?

a. Capture the security configuration of a master system
b. Apply security settings to a target system
c. Return a target system to its precompromised state
d. Evaluate compliance with security of a target system

Answer: c. Return a target system to its precompromised state

Computer Science & Information Technology

You might also like to view...

Most operating systems contain two fundamental forms of concurrent activity: processes and _________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A SMTP server listens on a well-known TCP port ____ for an incoming request.

A. 21 B. 25 C. 110 D. 115

Computer Science & Information Technology