Which of the following security methods is best used to track access to a server room?
a. Key lock
b. Mantrap
c. Biometric lock
d. Sign-in log
Answer: d. Sign-in log
Computer Science & Information Technology
You might also like to view...
To modify a slide background, you click Format Background in the Customize group on the DESIGN tab
Indicate whether the statement is true or false
Computer Science & Information Technology
Customer __________ programs such as Zappos Rewards and VIP help attract and retain customers.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology