Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?

A. rotary locks
B. combination locks
C. card access
D. deadbolt locks

Answer: C

Computer Science & Information Technology

You might also like to view...

Use document ________ to position a text box in a document

Fill in the blank(s) with correct word

Computer Science & Information Technology

The most popular database model currently in use is the ____.

a. relational model b. hierarchical model c. network model d. object model

Computer Science & Information Technology