Which procedure is used as a physical barrier to secure data against unauthorized access in a cloud storage data center?

a. restrict user access to the server center by using keycards
b. hiring only employees with no police record
c. keeping the firewall up to date
d. keeping antivirus software up to date


Answer: a. restrict user access to the server center by using keycards

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about indexes?

A) Access automatically creates all indexes for your tables. B) By creating an index for a field or fields in a table, Access can quickly locate all the records that contain specific values for those fields without having to read through each record in the table. C) An index in Access is similar to an index in a book. D) Indexes are created and used to increase performance.

Computer Science & Information Technology

Animated moviemaking is both processor and memory intensive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If cell E15 contains the function =PMT(B$15/12,C7*12,-D8), what type of cell reference is B$15?

What will be an ideal response?

Computer Science & Information Technology

Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.

a. multipoint b. point-to-point c. shared d. ring e. star

Computer Science & Information Technology