Which of the following physical security measures should be applied if the company is dealing with sensitive information?
A) Bio metric locks on all server rooms and equipment storage rooms
B) Security badges for all employees
C) Logging in all visitors
D) All of the above
D) All of the above
Computer Science & Information Technology
You might also like to view...
____________________ include superscript, subscript, strikethrough, small caps, and all caps.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A section break is a portion of the document that can be formatted differently from the rest of the document
Indicate whether the statement is true or false
Computer Science & Information Technology
A hacker is someone who accesses a computer or network legally.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Name two mobile design basics.
What will be an ideal response?
Computer Science & Information Technology