Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility.Which of the following terms BEST describes the security control being employed?

A. Administrative
B. Corrective
C. Deterrent
D. Compensating


Answer: A. Administrative

Computer Science & Information Technology

You might also like to view...

In the push function of the array implementation of the stack, recall that the element to push is passed into the function as a parameter. It is not passed by const reference because:

A. arrays are typically used for small elements, and this would prevent us from passing literal values, like push( 0 ) B. the element is expected to change within the push function C. we don’t want changes in the element to be reflected back to the calling function D. there is no danger of getting a runtime error in this situation

Computer Science & Information Technology

Tag attributes should be used for _______, not _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ________ is a series of dots or hyphens that connects two columns of information

A) border B) serif C) leader D) sizing handle

Computer Science & Information Technology

When adding a border to a cell, the Borders menu is displayed by clicking the ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology