Which of the following components would NOT be considered part of a baseline configuration?

Boost your career with the Certified CMMC Assessor Test. Study smart with diverse questions and detailed explanations. Prepare effectively for success!

A baseline configuration is a set of specifications that serve as a reference point for system security and operational integrity. It typically includes all the essential components that define the intended security posture of an organization's systems.

Standard software packages and versions are crucial for maintaining consistency in security updates and compatibility across systems. They form the core of what applications are trusted to run within the environment, ensuring that all instances are using the same vetted software.

Network topology documentation provides a visual layout and details about how different components connect and interact with each other within the network. This information is fundamental to understanding the attack surface and ensuring proper defenses are in place.

Hardware inventory specifications outline the physical components of the system, including the types and configurations of servers, workstations, and other devices. This documentation is vital for assessing the secure configuration of hardware and ensuring compliance with security measures.

User login records, however, do not directly contribute to the baseline configuration. While they are important for monitoring access and identifying potential security incidents, they do not serve as a standard element that characterizes the expected state of the system's configuration. Instead, they are more dynamic and reflect real-time activity rather than the established baseline configuration that dictates what systems should look like in terms of hardware and software specifications.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy