Which of the following would a security administrator implement in order to identify change from the standard
configuration on a server?

A.
Penetration test
B.
Code review
C.
Baseline review
D.
Design review
Explanation:
The standard configuration on a server is known as the baseline.
The IT baseline protection approach is a methodology to identify and implement computer security measures in
an organization. The aim is the achievement of an adequate and appropriate level of security for IT systems.
This is known as a baseline.
A baseline report compares the current status of network systems in terms of security updates, performance or
other metrics to a predefined set of standards (the baseline).