Door access to an organization’s server room is being scheduled. Which of the following are best practices for door access control? (Select all that apply.)

a. Require a proximity reader.
b. Require multiple keys.
c. Use biometrics.
d. Require key fobs.
e. All of the above.


a. Require a proximity reader.
c. Use biometrics.
d. Require key fobs.

Computer Science & Information Technology

You might also like to view...

In Java, __________ must be declared before they can be used.

a. variables b. literals c. key words d. comments

Computer Science & Information Technology

When a menu control’s _________ property equals True, a check appears next to the menu item.

a. showCheck b. Checked c. Check d. none of the above

Computer Science & Information Technology

If an unacceptable argument is used in a function, you will get a(n) ________ error

A) #NUM! B) #NULL! C) #REF! D) #VALUE!

Computer Science & Information Technology

You are designing a web application that stores static assets in an Amazon Simple Storage Service (S3) bucket. You expect this bucket to immediately receive over 150 PUT requests per second. What should you do to ensure optimal performance?

A. Use multi-part upload. B. Add a random prefix to the key names. C. Amazon S3 will automatically manage performance at this scale. D. Use a predictable naming scheme, such as sequential numbers or date time sequences, in the key names

Computer Science & Information Technology