Creatingsecure baseline imagesensuresconsistent, repeatabledeployment aligned with hardening standards. These images can be used acrosson-premises and cloud environments, ensuring compliance and reducing misconfigurations.
Vulnerability alerts (A)are reactive, not preventive.
Building images from scratch (C)is time-consuming and unnecessary if baselines exist.
Scripts for cleanup (D)are useful but do not prevent initial insecure configurations.
[Reference:CompTIA SecurityX (CAS-005) Exam Objectives- Domain 3.0 (Security Engineering), Section onSystem Hardening & Configuration Management, , , , ]
Submit