answersLogoWhite

0

Locked doors, secure cabinets,etc.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What are two threats are physical to a network server?

Natural Disasters such as floods, fires and tornados/huracanes and physical threats such as unauthorized access to your server rooms, should have an id badge in order to access incase they want to steal a hard drive with important information on...


What precautions would be part of a physical access security strategy?

Pick one (all are applicable) 1. you should prevent physical access to switches, routers, and servers. 2. you should prevent physical access to access points. 3. you should use lockable enclosures for access points or mount them in physically secure locations, such as locked rooms.


What controls access to the resources of the network?

Nope a server does


Why does a network need a server?

When we send a data to server or access the data their will be must a network.Through network we access the data and save the data to the File server or cloud server.


What is a server's physical case?

what is the difference between a server physical case and a client case


How do I access server on mhy computer?

here was no what answer to my server ?key do I click to get to a server?


Who would be able to access the Microsoft commerce server?

Anyone is able to access the Microsoft commerce server. Although everyone can access it, to be able to access it one must first download the commerce server files first.


True or False A RADIUS server does not replace functions performed by the remote access server but communicates with the access server to manage user logons?

True


What are some Linux server security methods?

Some methods to ensure a secure Linux environment include encrypting the hard drive to prevent physical compromise, ensuring strong passwords or key based access for users, using only secure methods of remote access (such as SSH and SFTP), and regularly applying software updates.


What is another term for a remote access server?

client server


What is the primary function of a drive lock?

To prevent unauthorized access to data in case of theft or physical tampering.


How do you prevent user from browsing websites through local area connection?

You have many choices. First is to use security politics and forbid users to have access to internet. Another well known method is to install proxy server. But you have to have a server which is responsible for internet. On the server you have to install proxy server and create rules for all users.