An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?

A. Multifactor authentication
B. RFID chip
C. Cipher locks
D. Bollards


Answer: A. Multifactor authentication

Computer Science & Information Technology

You might also like to view...

A collection of BSSs connected by one or more DSs is referred to as an ____ service set (ESS).

A. electric B. extended C. elaborate D. eccentric

Computer Science & Information Technology

Alice has an event type that will cause a method to run whenever the mouse is clicked on an object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The depth first traversal is similar to the preorder traversal of a binary tree.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

For what time period should you schedule a network change?

Computer Science & Information Technology