True/False
Biometric systems limit personnel access to computer rooms based on something they know, such as a secret code to be punched in.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q3: Controlled access to the computer system is
Q4: In Secure Socket Layer (SSL) technology on
Q5: A transaction log records the value of
Q6: Deadlock cannot happen if locks are used
Q7: A hot site consists of hardware similar
Q9: Deadlock is usually handled by detection rather
Q10: Grand Travel Airlines has a centralized, mainframe-based
Q11: All of the following are rules of
Q12: A signature is a portion of a
Q13: In public key encryption, the private key