An administrator decides to implement access control techniques to secure a datacenter. Which of
the following would be the STRONGEST technique for the administrator to use?

A.
Multifactor authentication
B.
RFID chip
C.
Cipher locks
D.
Bollards