A facility would like to verify each individual's identity prior to allowing access to the datacenter. Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of the following would BEST meet these goals?
A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap
B. Implement a security guard at the facility entrance and a keypad on the datacenter entrance
C. Implement a CCTV camera and a proximity reader on the datacenter entrance
D. Implement a biometric reader at the facility entrance and a proximity card at the datacenter entrance
Answer: A. Implement a biometric reader at the datacenter entrance and require passage through a mantrap
You might also like to view...
If a base class has a public member function, and the derived class has a member function with the same name, but with a different parameter list, this function is said to be
a. overloaded b. redefined c. overwritten d. a syntax error
Rewrite increase volume so that it takes two inputs: the sound to increase in volume and a filename where the newly louder sound should be stored. Then increase the volume and write the sound out to the name file. You might also try rewriting it so that it takes an input filename instead of the sound, so that inputs are both filenames.
What will be an ideal response?
If you are going to ________ music, then you will usually copy the music to a CD
Fill in the blank(s) with correct word
A server technician is notified that Linux web services are no longer accessible. The technician is at a remote site only has access to a Windows workstation. Which of the following should the technician use to remotely restart the web services?
A. Connect to the server using SSH B. Connect to the server using RDP C. Connect to the server using SCP D. Connect to the server using FTPS