Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?
A. rotary locks
B. combination locks
C. card access
D. deadbolt locks
Answer: C
Computer Science & Information Technology
You might also like to view...
Use document ________ to position a text box in a document
Fill in the blank(s) with correct word
Computer Science & Information Technology
The most popular database model currently in use is the ____.
a. relational model b. hierarchical model c. network model d. object model
Computer Science & Information Technology