The purpose of a deadman door controlling access to a computer facility is primarily to:
The purpose of a deadman door controlling access to a computer facility is primarily to:
Which of the following is the MOST reliable form of single factor personal identification?
Which of the following is the MOST reliable form of single factor personal identification?
Which of the following is MOST important to protect the computing assets in the center?
A data center has a badge-entry system. Which of the following is MOST important to protect the
computing assets in the center?
Which of the following physical access controls effectively reduces the risk of piggybacking?
Which of the following physical access controls effectively reduces the risk of piggybacking?
The MOST effective biometric control system is the one:
The MOST effective biometric control system is the one:
Which of the following is the BEST way to satisfy a two-factor user authentication?
Which of the following is the BEST way to satisfy a two-factor user authentication?
What should an organization do before providing an external agency physical access to its information processi
What should an organization do before providing an external agency physical access to its
information processing facilities (IPFs)?
Regarding the access card system, the IS auditor should be MOST concerned that:
An IS auditor is reviewing the physical security measures of an organization. Regarding the access
card system, the IS auditor should be MOST concerned that:
Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them?
Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them?
Which of the following is the MOST important objective of data protection?
Which of the following is the MOST important objective of data protection?