What is an incorrect method to control physical access to computer equipment?

Prepare for the ACCA F1 Certification Exam with detailed quizzes featuring multiple choice questions and explanations. Enhance your understanding and ensure success in your exam!

Controlling physical access to computer equipment is essential for maintaining the security and integrity of sensitive information. Effective methods include employing security personnel, using door locks and surveillance cameras, and installing intruder alarms. Each of these methods offers tangible barriers or deterrents to unauthorized access.

Relying solely on "no entry" signs is an insufficient method for controlling access. While such signs can serve as a warning or deterrent, they do not provide any physical barrier or active monitoring. Unauthorized individuals may disregard the signage without any consequence, leaving the computer equipment vulnerable. This makes it an inadequate measure on its own for protecting valuable assets and ensuring the physical security of sensitive areas. Therefore, while the other methods provide a more robust level of protection and security, merely posting signs does not actively restrict or prevent access.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy