A. Entry logging B. Combination locks C. Card keys D. Dead bolts
A.Incremental backup B.Data only backups C.SAN replication D.Full backup
A. Implement an intrusion detection system (IDS). B. Implement a dual-factor authentication method. C. Implement a patch management process. D. Implement stronger user passwords.