To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend:
A、online terminals are placed in restricted areas.
B、online terminals are equipped with key locks.
C、ID cards are required to gain access to online terminals.
D、online access is terminated after a specified number of unsuccessful attempts.