Configuration monitoring and management tools (often part of network management systems) maintain version-controlled records of device configurations, track changes, and log who made them. This provides accountability and supports compliance audits.
A. Network access control (NAC) manages endpoint access policies but does not track device config changes.
C. Zero Trust is a security framework requiring strict identity verification, not a configuration tracking tool.
D. Syslog collects system logs, but without a config monitoring system, it does not directly compare documentation to device state.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit