6. A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current
firewall to ensure no changes have been made What does this scenario describe?
Upgrading the interface between computer hardware and the user
Checking baseline configuration
Verifying user identity when accessing an OS
Responsibly managing applications