Which of the following describes the BEST configuration management practice?

A.
After installing a new system, the configuration files are copied to a separate back-up system and
hashed to detect tampering.
B.
After installing a new system, the configuration files are copied to an air-gapped system and
hashed to detect tampering.
C.
The firewall rules are backed up to an air-gapped system.
D.
A baseline configuration is created and maintained for all relevant systems.