Which of the following access methods uses radio frequency waves for authentication?

A. Video surveillance
B. Mantraps
C. Proximity readers
D. Biometrics


Answer: C. Proximity readers

Computer Science & Information Technology

You might also like to view...

DTDs use more general numbering with a(n) ____________________ symbol, which specifies the number of occurrences of each element.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A regional blood inventory system that is instituted in one regional hospital with plans to install the system in the remaining hospitals is an example of a ________ prototype.

A) first-of-a-series B) patched-up C) nonoperational D) selected features

Computer Science & Information Technology

What are the major tasks you can perform in Devices and Printers?

What will be an ideal response?

Computer Science & Information Technology

The CIO of the company wants to mitigate the effects of zero-day attacks by applying third-party patches. If the company decides to go that route, which of the following would be the most important addition to their network?

A. secure version of DNS B. create a test network C. stateful firewalls D. HIDS

Computer Science & Information Technology