An administrator decides to implement access control techniques to secure a datacenter. Which of the
following would be the STRONGEST technique for the administrator to use?
A.
Multifactor authentication
B.
RFID chip
C.
Cipher locks
D.
Bollards