Which physical security method is most secure?
C
Which access method is used for channeling high traffic through a security
checkpoint?
D
Which two criteria make bar code cards a good choice? (Choose two.)
A,B
What is the primary feature of a smart card?
C
What is the primary security disadvantage of a bar code card?
C
What is the major weakness of a bar code card system?
C
What are the three basic physical security categories that describe
technologies for personnel identification? (Choose three.)
A,C,E
What are two primary questions that any good physical security system
should consider regarding any visitor to the data center?
A
In a conceptual discussion on security, which example illustrates the concept
of "depth of security"?
D
What is the primary reason that physical security reduces data center
downtime?
B