During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?
Configuration monitoring and management tools (often part of network management systems) maintain version-controlled records of device configurations, track changes, and log who made them. This provides accountability and supports compliance audits.
A. Network access control (NAC) manages endpoint access policies but does not track device config changes.
C. Zero Trust is a security framework requiring strict identity verification, not a configuration tracking tool.
D. Syslog collects system logs, but without a config monitoring system, it does not directly compare documentation to device state.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit