An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?
A. Multifactor authentication
B. RFID chip
C. Cipher locks
D. Bollards
Answer: A. Multifactor authentication
Computer Science & Information Technology
You might also like to view...
If a computer's collating sequence places uppercase letters in consecutive ordinal positions, then
``` int('F') - int('A') ``` is ____________________. a. not defined b. 5 c. 4 d. 'B' e. 'D'
Computer Science & Information Technology
A rootkit can be a backdoor.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology