Which of the following will prevent unauthorized access to the server room?

A. Biometric lock
B. PKI card
C. Cable lock
D. RSA token


Answer: A. Biometric lock

Computer Science & Information Technology

You might also like to view...

It’s recommended that you do not explicitly create and use Thread objects to implement concurrency, but rather use the ________ interface.

a. ExecutorService b. Runnable c. Concurrent d. Executor

Computer Science & Information Technology

A VPN, used properly, allows use of the Internet as if it were a private network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) _____ describes how an organization will achieve its vision, mission, objectives, and goals.

a. strategy b. result c. operation d. process

Computer Science & Information Technology

Presentations contain multiple sheets

Indicate whether the statement is true or false

Computer Science & Information Technology