Ann, a security administrator, is strengthening the security controls of the company's campus. Her goal is to prevent people from accessing open locations that are not supervised, such as around the receiving dock. She is also concerned that employees are using these entry points as a way of bypassing the security guard at the main entrance. Which of the following should Ann recommend that would BEST address her concerns?

A. Increase the lighting surrounding every building on campus
B. Build fences around campus with gate entrances
C. Install cameras to monitor the unsupervised areas
D. Construct bollards to prevent vehicle entry in non-supervised areas


Answer: B. Build fences around campus with gate entrances

Computer Science & Information Technology

You might also like to view...

The address bar at the top of the Computer folder window depicts a file location.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

&[File] is an example of a ________ that instructs Excel to insert a specific item in a header or footer when a worksheet is printed

A) label B) formula C) placeholder D) function

Computer Science & Information Technology

The unless modifier is the logical opposite of the if modifier.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To view an embedded object represented by an icon, ____ the icon.

A. select B. drag C. right-click D. double-click

Computer Science & Information Technology