Your company has decided that security is very important and wants to add a second security check that will identify its employees while they are logging in to their computers.
What type of security do you recommend?
A. Key fobs
B. Smart cards
C. Biometric locks
D. Hardware tokens
Answer: C
You might also like to view...
Access is not able to ________ an attachment
A) copy B) save C) analyze the data within D) print
Which of the following protocol specification keywords would be needed in an ACL statement to match the RIPv2 protocol with destination address 224.0.0.9?
A) udp B) osfp C) eigrp D) tcp
Case-Based Critical Thinking QuestionsCase 1-1Tony is in charge of all presentations for a Fortune 500 pharmaceutical company. In addition to creating powerful and persuasive presentations, Tony must make sure each presentation is in perfect shape before uploading them to the company Web site. Tony has finished a presentation and wants to lock in all of his modifications, so he marks it as final, making it a(n) ____ file.
A. digitally signed B. read-only C. prepared D. archived
You are about to install a brand new copay of Windows 7 Ultimate 64-bit. What should be your primary concern given the options? (Choose BEST option)
a. What type of processor is installed b. How fast your RAM is c. What type of RAM is installed d. How fast the processor is