Multiple Choice
A secure facility has a server room that currently is controlled by a simple lock and key, and several administrators have copies of the key. To maintain regulatory compliance, a second lock, which is controlled by an application on the administrators' smartphones, is purchased and installed. The application has various authentication methods that can be used. The criteria for choosing the most appropriate method are: It cannot be invasive to the end user. It must be utilized as a second factor. Information sharing must be avoided. It must have a low false acceptance rate. Which of the following BEST meets the criteria?
A) Facial recognition
B) Swipe pattern
C) Fingerprint scanning
D) Complex passcode
E) Token card
Correct Answer:

Verified
Correct Answer:
Verified
Q99: A security architect is determining the best
Q100: A security consultant is improving the physical
Q101: During a security assessment, activities were divided
Q102: A systems administrator recently joined an organization
Q103: A medical facility wants to purchase mobile
Q105: A security researcher is gathering information about
Q106: A company has gone through a round
Q107: A penetration tester has been contracted to
Q108: A security engineer is embedded with a
Q109: Click on the exhibit buttons to view