Steven is the senior network administrator for Onkton Incorporated, an oil well drilling company in Oklahoma City. Steven and his team of IT technicians are in charge of keeping inventory for the entire company; including computers, software, and oil well equipment. To keep track of everything, Steven has decided to use RFID tags on their entire inventory so they can be scanned with either a wireless scanner or a handheld scanner. These RFID tags hold as much information as possible about the equipment they are attached to. When Steven purchased these tags, he made sure they were as state of the art as possible. One feature he really liked was the ability to disable RFID tags if necessary. This comes in very handy when the company actually sells oil drilling equipment to other companies. All Steven has to do is disable the RFID tag on the sold equipment and it cannot give up any information that was previously stored on it.
What technology allows Steven to disable the RFID tags once they are no longer needed?
A.
Newer RFID tags can be disabled by using Terminator Switches built into the chips
B.
RFID Kill Switches built into the chips enable Steven to disable them
C.
The company’s RFID tags can be disabled by Steven using Replaceable ROM technology
D.
The technology used to disable an RFIP chip after it is no longer needed, or possibly stolen, is called RSA Blocking
Explanation:
http://www.rsa.com/rsalabs/node.asp?id=2060