Door access to an organization’s server room is being scheduled. Which of the following are best practices for door access control? (Select all that apply.)

a. Require a proximity reader.
b. Require multiple keys.
c. Use biometrics.
d. Require key fobs.
e. All of the above.

a. Require a proximity reader.
c. Use biometrics.
d. Require key fobs.

Computer Science & Information Technology

You might also like to view...

In the earlier versions of C++, the process of creating a new object is referred to as ____ an object.

a. defining b. declaring c. instantiating d. allocating

Computer Science & Information Technology

When you click the Sign In link in the Folio Builder panel, you are prompted to sign in using your Adobe ID.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology