In the case of configuration, there is often a secure
mode of operation that a manager enters in order to alter the running configuration of
a device. Some devices allow an operator to store multiple copies of configurations in
case they have different scenarios to configure or if a particular configuration happens
to not work, they have another one to fall back to. This is shown in the brief snippet
here: