Which of the following physical security measures should be applied if the company is dealing with sensitive information?

a. Biometric locks on all server rooms and equipment closets
b. Security badges for all employees
c. Logging all visitors
d. All the above


ANS: D

Computer Science & Information Technology

You might also like to view...

A thread enters the _________ state, after waiting, if it is ready to run but the resources are not available.

A) ?Terminated ? B) ?Standby ? C) ?Transition ? D) ?Waiting

Computer Science & Information Technology

The largest allowable cookie size is ____________________ kilobytes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What must be done with a node that is removed from the bag?

a. Set it to nullptr b. Decrement itemCount c. Use the delete command so system can use returned memory d. return canRmoveItem

Computer Science & Information Technology

Which statement is true?

a) Assigning a value to a symbolic constant in an executable statement is a syntax error. b) A symbolic constant is a variable. c) Space is reserved for both symbolic constants and variables that hold values at execution time. d) Only uppercase letters can be used for symbolic constant names.

Computer Science & Information Technology