Which of the following physical security controls prevents an attacker from gaining access to a network closet?
A. CCTVs
B. Proximity readers
C. Motion sensors
D. IP cameras
Answer: B. Proximity readers
You might also like to view...
Which of the following segments is a proper way to call the method readData four times?
a. double k = 0.0; while (k != 4) { readData(); k = k + 1; } b. int i = 0; while (i <= 4) { readData(); i = i + 1; } c. int i = 0; while (i < 4) { readData(); } d. int i = 0; while (i < 4) { readData(); i = i + 1; }
A Linux client can participate in the Windows environment by using the ____ program.
A. CIFSCLI B. SMBFETCH C. WINCLIENT D. SMBCLIENT
When we detect that a tree has become unbalanced, we must rebalance it. AVL trees are balanced by ____ nodes either to the left or to the right.
A. swapping B. rotating C. displacing D. rebalancing
Which statement is true of an IPv6 prefix?
A. An IPv6 prefix does not exist. B. An IPv6 prefix is limited to 32 bits in length. C. An IPv6 prefix consists of all zeros. D. An IPv6 prefix is a maximum of 64 bits.