Posted by: Pdfprep
Post Date: September 11, 2021
A secure facility has a server room that currently is controlled by a simple lock and key. and several administrators have copies of the key. To maintain regulatory compliance, a second lock, which is controlled by an application on the administrators’ smartphones, is purchased and installed. The application has various authentication methods that can be used.
The criteria for choosing the most appropriate method are:
• It cannot be invasive to the end user
• It must be utilized as a second factor.
• Information sharing must be avoided
• It must have a low false acceptance rate.
Which of the following BEST meets the criteria?
A . Facial recognition
B . Swipe pattern
C . Fingerprint scanning
D . Complex passcode
E . Token card
Answer: C
Leave a Reply