adplus-dvertising
frame-decoration

Question

Restricted access to the server computer room is present in a form of

a.

logical security

b.

enterprise security

c.

physical security

d.

user security

Posted under IT Fundamentals

Answer: (c).physical security

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Restricted access to the server computer room is present in a form of

Similar Questions

Discover Related MCQs

Q. Protecting computers and information they contain against unwanted access, damage, modification or destruction is called

Q. Which of the following is not the way of ensuring that even if the hardware fails, you will still be able to access your data in computer?

Q. The most devastating loss to a company is

Q. Security protection for personal computers includes

Q. Secret words or numbers used for protection of devices is called

Q. All of the following are biometric techniques except

Q. Example of a good password is

Q. Most computer crimes are committed by

Q. Person who gains illegal access to a computer system is known as

Q. In a computer, McAfee is a/an

Q. Which of the following is harmful for computer?

Q. Computer virus is simply a

Q. Viruses which executes when computer starts is

Q. Special program which can detect and remove viruses from computer is called

Q. Example of computer anti virus program includes

Q. Program that interferes with the normal routine of the computer is called

Q. Which of the following is computer virus?

Q. Virus reaches from one computer to another by

Q. All of the given below are anti virus programs except

Q. Which of the following is not a cause of computer virus?