An administrator decides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?

A. Multifactor authentication
B. RFID chip
C. Cipher locks
D. Bollards

Answer: A. Multifactor authentication

Computer Science & Information Technology

You might also like to view...

If a computer's collating sequence places uppercase letters in consecutive ordinal positions, then

``` int('F') - int('A') ``` is ____________________. a. not defined b. 5 c. 4 d. 'B' e. 'D'

Computer Science & Information Technology

A rootkit can be a backdoor.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology