A company is trying to implement physical deterrent controls to improve the overall security posture of their data center. Which of the following BEST meets their goal?

A. Visitor logs
B. Firewall
C. Hardware locks
D. Environmental monitoring


Answer: C. Hardware locks

Computer Science & Information Technology

You might also like to view...

When you transmit information in a data packet to a computer on a network, the request is sent to every computer on that network that uses the same Ethernet cable or wireless LAN.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Define the exception class MemoryAllocationExceptand then revise the definition of the method pushin the class LinkedStackso that it throws this exception if it cannot allocate a new node.

What will be an ideal response?

Computer Science & Information Technology

Which is NOT an advantage of Java?

a. Java is architecture neutral. b. Java needs to compile only once prior to distribution. c. Java supports network communications. d. Java performs faster than C++.

Computer Science & Information Technology

If the chage command is used without options, it is in ____ mode.

A. default B. terminal C. interactive D. inactive

Computer Science & Information Technology