Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.
 
What is your company’s new security called?

A. Theft prevention
B. Mantrap
C. Entry control roster
D. Security outpost


Answer: B

Computer Science & Information Technology

You might also like to view...

The Do…Loop While statement is an example of a:

a) Selection statement b) Repetition statement c) Loop statement d) Sequence statement

Computer Science & Information Technology

Which of the following buttons on the formula bar should you click to complete your entry?

A.
B.
C.
D.

Computer Science & Information Technology

A(n) ____ plan addresses the identification, classification, response, and recovery from an incident.

A. incident response B. disaster recovery C. attack profile D. business impact analysis

Computer Science & Information Technology

In deep copying, each reference variable refers to its own object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology