A security administrator is in the process of defining the initial set of security configurations that will be applied to all new devices in the company. Which of the following is the BEST method to achieve this objective?
You selected this option
Enforcing full-disk encryption on all new devices.
You selected this option
Applying a standardized security configuration guide to the devices.
You selected this option
Regularly patching the devices as part of routine maintenance.
You selected this option
Setting up a proper disposal and decommissioning process for devices.
Using a standardized security configuration guide specifically designed for the intended system or platform is the best method to establish a secure baseline. These guides, often developed by experts and incorporating industry best practices, ensure that all devices start from a common, secure state before being introduced into the production environment. They typically include settings and configurations that have been widely recognized and vetted for their effectiveness in securing devices. While patching, encryption, and decommissioning play roles in the lifecycle of maintaining security for active devices, they are not methods used for establishing the baseline itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security configuration guide?
Open an interactive chat with Bash
Why is establishing a baseline security configuration important?
Open an interactive chat with Bash
What are some common elements included in a security configuration guide?