A security template can be used to perform all but which of the following tasks?
a. Capture the security configuration of a master system
b. Apply security settings to a target system
c. Return a target system to its precompromised state
d. Evaluate compliance with security of a target system
Answer: c. Return a target system to its precompromised state
Computer Science & Information Technology
You might also like to view...
Most operating systems contain two fundamental forms of concurrent activity: processes and _________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A SMTP server listens on a well-known TCP port ____ for an incoming request.
A. 21 B. 25 C. 110 D. 115
Computer Science & Information Technology