A company wants to prevent unauthorized access to its secure data center. Which of the following security controls would be MOST appropriate?

A. Alarm to local police
B. Camera
C. Security guard
D. Motion detector


Answer: C. Security guard

Computer Science & Information Technology

You might also like to view...

To add an item to a CheckedListBox use:

a) the Add method b) the AddRange method c) the String Collection Editor d) All of the above

Computer Science & Information Technology

Which of the following is the path to the Table Styles gallery?

A. (TABLE TOOLS LAYOUT tab | Table Styles group) B. (TABLE TOOLS DESIGN tab | Table Styles group) C. (TABLE TOOLS FORMAT tab | Styles group) D. None of the above

Computer Science & Information Technology

________ are organized into groups of related commands that are activated by clicking on a button

A) Galleries B) Dialog Boxes C) Tabs D) Menus

Computer Science & Information Technology

If a layer is duplicated, all of the artwork on the layer will be duplicated as well.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology