Which of the following physical security controls is MOST likely to be susceptible to a false positive?

A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera


Answer: C. Proximity reader

Computer Science & Information Technology

You might also like to view...

Memory modules have a(n) _______ that prevents you from inserting the module into the expansion slot the wrong way

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT a standard practice for protecting computer systems?

A) use wireless LAN connections without encryption B) use antivirus and antimalware software and their automatic update features C) use firewall software to intercept threats D) update applications such as Microsoft Office products regularly

Computer Science & Information Technology

?Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

A. ?top-down approach B. ?test plan C. ?training plan D. ?integrated approach

Computer Science & Information Technology

A ____ runs on a remote Web server somewhere on the Internet.

A. software application B. Web application C. remote application D. portable application

Computer Science & Information Technology