A company is receiving a large number of laptop theft reports in the corporate buildings. Which of the following is the MOST cost-efficient way to discourage theft of laptops?
A. A CCTV system
B. A cable lock
C. A badge reader
D. A retina scanner
Answer: B. A cable lock
You might also like to view...
Match each item with a statement below.
A. a device used in mobile devices to sense the physical position of the device B. an area where access to Wi-Fi Internet connectivity is made available, such as at a coffee shop, retail store, or airport C. a device that contains a disc that is free to move and can respond to gravity as the device is moved D. based on Mac OS X and is currently used on the iPhone, iPad, and iPod touch by Apple E. a feature that uses Bluetooth to detect nearby compatible devices, then creates a peer-to-peer network using a Wi-Fi signal between the devices F. allows a task to be started on a device, such as an iPad, and then pick up that task on another device, such as a Mac desktop or laptop G. a unique number that identifies a cellular subscription for a device or subscriber, along with its home country and mobile network H. a unique number that identifies each mobile phone or tablet device worldwide. I. the process of connecting with another Bluetooth device J.
An example of a ________ is (C5+D5 )/100
A) formula B) text string C) named range D) function
The ____ of a vertex in a digraph is the number of arcs leaving the vertex.
A. degree B. indegree C. outdegree D. expansion factor
Match each item with a statement below:
A. the underlying foundation or basic framework for a large environment B. provides identification of the specific entity involved C. provides a consistent way to send and receive secure MIME data in e-mail D. the community served by a CA E. publishes certificates so that users can find them F. a list of certificates that have been revoked and should not be used G. a uniform resource identifier (URI) that points to a CPS published by the issuing CA H. a process that reliably and securely stores keying material even though the certificate is expired I. the simplest form of CRL