Which of the following will prevent unauthorized access to the server room?

A. Biometric lock
B. PKI card
C. Cable lock
D. RSA token

Answer: A. Biometric lock

Computer Science & Information Technology

You might also like to view...

The four steps of the information processing cycle are input, processing, ________, and output

Fill in the blank(s) with correct word

Computer Science & Information Technology

A rule that affects all website content is called a global CSS rule.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology