To prevent unauthorized entry to the data maintained in a dial-up, fast response system, an IS auditor should recommend: 
A、online terminals are placed in restricted areas. 
B、online terminals are equipped with key locks. 
C、ID cards are required to gain access to online terminals. 
D、online access is terminated after a specified number of unsuccessful attempts.