Which of the following will prevent unauthorized access to the server room?
A. Biometric lock
B. PKI card
C. Cable lock
D. RSA token
Answer: A. Biometric lock
Computer Science & Information Technology
You might also like to view...
It’s recommended that you do not explicitly create and use Thread objects to implement concurrency, but rather use the ________ interface.
a. ExecutorService b. Runnable c. Concurrent d. Executor
Computer Science & Information Technology
A VPN, used properly, allows use of the Internet as if it were a private network.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) _____ describes how an organization will achieve its vision, mission, objectives, and goals.
a. strategy b. result c. operation d. process
Computer Science & Information Technology
Presentations contain multiple sheets
Indicate whether the statement is true or false
Computer Science & Information Technology