An administrator dec
ides to implement access control techniques to secure a datacenter. Which of the following would be the STRONGEST technique for the administrator to use?
A. Multifactor authentication
B. RFID chip
C. Cipher locks
D. Bollards