B. Network Traffic/Service Baseline sounds like the right answer to me. Monitoring and controlling network traffic is a key aspect of implementing the Boundary Defense control.
I'm pretty sure the answer is C. Network Device Configuration Baselines. That's the baseline that ensures the security of network devices, which is crucial for the Boundary Defense CIS Control.
I'm not sure, but I think it might be B) Network Traffic/Service Baseline, as monitoring network traffic can help detect and prevent unauthorized access.
Dominga
2 hours agoLawrence
1 days agoEdwin
16 days agoAdela
19 days agoLeigha
23 days ago