An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?
A. Multifactor authentication
B. RFID chip
C. Cipher locks
D. Bollards
Answer: A. Multifactor authentication
Computer Science & Information Technology
You might also like to view...
A collection of BSSs connected by one or more DSs is referred to as an ____ service set (ESS).
A. electric B. extended C. elaborate D. eccentric
Computer Science & Information Technology
Alice has an event type that will cause a method to run whenever the mouse is clicked on an object.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The depth first traversal is similar to the preorder traversal of a binary tree.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
For what time period should you schedule a network change?
Computer Science & Information Technology