Which of the following access methods uses radio frequency waves for authentication?
A. Video surveillance
B. Mantraps
C. Proximity readers
D. Biometrics
Answer: C. Proximity readers
You might also like to view...
DTDs use more general numbering with a(n) ____________________ symbol, which specifies the number of occurrences of each element.
Fill in the blank(s) with the appropriate word(s).
A regional blood inventory system that is instituted in one regional hospital with plans to install the system in the remaining hospitals is an example of a ________ prototype.
A) first-of-a-series B) patched-up C) nonoperational D) selected features
What are the major tasks you can perform in Devices and Printers?
What will be an ideal response?
The CIO of the company wants to mitigate the effects of zero-day attacks by applying third-party patches. If the company decides to go that route, which of the following would be the most important addition to their network?
A. secure version of DNS B. create a test network C. stateful firewalls D. HIDS