In computer networks and enterprise data centers, door access should be controlled through the use of proximity readers or which of the following? (select the best answer)"

What will be an ideal response?


key fob

Computer Science & Information Technology

You might also like to view...

A botnet is a network of computer zombies or bots

Indicate whether the statement is true or false

Computer Science & Information Technology

A value of ____ for the visibility property displays an element.

A. true B. show C. block D. visible

Computer Science & Information Technology

FIGURE PB 2-1Referring to Figure PB 2-1 above, the picture of the child was just inserted into the placeholder.  The appearance of the crop marks indicates that ____.

A. the photo of the child was bigger than the placeholder B. the placeholder was bigger than the photo of the child C. there was a problem with the way the photo was pasted into the placeholder D. all of the above

Computer Science & Information Technology

A customer is running a multi-tier web application farm in a virtual private cloud (VPC) that is not connected to their corporate network. They are connecting to the VPC over the Internet to manage all of their Amazon EC2 instances running in both the public and private subnets. They have only authorized the bastion-security-group with Microsoft Remote Desktop Protocol (RDP) access to the application instance security groups, but the company wants to further limit administrative access to all of the instances in the VPC. Which of the following Bastion deployment scenarios will meet this requirement?

A. Deploy a Windows Bastion host on the corporate network that has RDP access to all instances in the VPC, B. Deploy a Windows Bastion host with an Elastic IP address in the public subnet and allow SSH access to the bastion from anywhere. C. Deploy a Windows Bastion host with an Elastic IP address in the private subnet, and restrict RDP access to the bastion from only the corporate public IP addresses. D. Deploy a Windows Bastion host with an auto-assigned Public IP address in the public subnet, and allow RDP access to the bastion from only the corporate public IP addresses.

Computer Science & Information Technology