Which of the following types of locks utilizes key fobs or key cards held against a sensor/reader to gain access?
Which of the following documents would explain the consequences of server downtime?
A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?
A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?