Which of the following physical security controls prevents an attacker from gaining access to a network closet?

A. CCTVs
B. Proximity readers
C. Motion sensors
D. IP cameras


Answer: B. Proximity readers

Computer Science & Information Technology

You might also like to view...

Which of the following segments is a proper way to call the method readData four times?

a. double k = 0.0; while (k != 4) { readData(); k = k + 1; } b. int i = 0; while (i <= 4) { readData(); i = i + 1; } c. int i = 0; while (i < 4) { readData(); } d. int i = 0; while (i < 4) { readData(); i = i + 1; }

Computer Science & Information Technology

A Linux client can participate in the Windows environment by using the ____ program.

A. CIFSCLI B. SMBFETCH C. WINCLIENT D. SMBCLIENT

Computer Science & Information Technology

When we detect that a tree has become unbalanced, we must rebalance it. AVL trees are balanced by ____ nodes either to the left or to the right.

A. swapping B. rotating C. displacing D. rebalancing

Computer Science & Information Technology

Which statement is true of an IPv6 prefix?

A. An IPv6 prefix does not exist. B. An IPv6 prefix is limited to 32 bits in length. C. An IPv6 prefix consists of all zeros. D. An IPv6 prefix is a maximum of 64 bits.

Computer Science & Information Technology