A security manager is discussing change in the security posture of the network, if a proposed application is
approved for deployment. Which of the following is the MOST important the security manager must rely upon to
help make this determination?
Ports used by new application
Protocols/services used by new application
Approved configuration items
Current baseline configuration