
微信扫一扫
实时资讯全掌握
Which of the following statements best characterizes the function of a physical access control? A. Protects systems from the transmission of Trojan horses. B. Separates unauthorized individuals from computer resources. C. Provides authentication of users attempting to log into the system. D. Minimizes the risk of incurring a power or hardware failure. |