Respuesta :

Configuration rules are instructions a system administrator codes into a security device to specify how it operates.True

Configuration rules

Network configuration rules are first done by assigning the preferred network settings, policies, flows, and controls. This changes the design of the device according to administrator or user specifications.

The two phases or steps of Configuration involves

  • Configuration phase
  • Execution phase

Read more on Configuration rules in Network Systems here: https://brainly.com/question/13164289