A secure facility has a server room that currently is controlled by a simple lock and key, and several administrators have copies of the key. To maintain regulatory compliance, a second lock, which is controlled by an application on the administrators' smartphones, is purchased and installed. The application has various authentication methods that can be used. The criteria for choosing the most appropriate method are: It cannot be invasive to the end user. It must be utilized as a second factor. Information sharing must be avoided. It must have a low false acceptance rate. Which of the following BEST meets the criteria?
A) Facial recognition
B) Swipe pattern
C) Fingerprint scanning
D) Complex passcode
E) Token card
Correct Answer:
Verified
Q377: Which of the following are the MOST
Q378: A technician is reviewing the following log:
Q379: A smart switch has the ability to
Q380: A company has made it a spending
Q381: Several days after deploying an MDM for
Q383: A security engineer discovers a PC may
Q384: A security analyst receives an email from
Q385: A security administrator receives reports that several
Q386: A Chief Information Security Officer (CISO) has
Q387: A SaaS provider decides to offer data
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents