The security administrator runs an rpm verify command which records the MD5 sum, permissions, and
timestamp of each file on the system. The administrator saves this information to a separate server. Which of
the following describes the procedure the administrator has performed?
Host software base-lining
File snapshot collection