Which of the following will prevent unauthorized access to the server room?
A. Biometric lock
B. PKI card
C. Cable lock
D. RSA token
Answer: A. Biometric lock
Computer Science & Information Technology
You might also like to view...
The four steps of the information processing cycle are input, processing, ________, and output
Fill in the blank(s) with correct word
Computer Science & Information Technology
A rule that affects all website content is called a global CSS rule.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology