Which of the following is the MOST effective control over visitor access to a data center?
Which of the following is the MOST effective control over visitor access to a data center?
which of the following attacks?
The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?
A firm is considering using biometric fingerprint identification on all PCs that access critical dat
A firm is considering using biometric fingerprint identification on all PCs that access critical datA.
This requires:
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
Which of the following biometrics has the highest reliability and lowest false-acceptance rate
(FAR)?
The MOST likely explanation for a successful social engineering attack is:
The MOST likely explanation for a successful social engineering attack is:
The purpose of a deadman door controlling access to a computer facility is primarily to:
The purpose of a deadman door controlling access to a computer facility is primarily to:
Which of the following is the MOST reliable form of single factor personal identification?
Which of the following is the MOST reliable form of single factor personal identification?
Which of the following is MOST important to protect the computing assets in the center?
A data center has a badge-entry system. Which of the following is MOST important to protect the
computing assets in the center?
Which of the following physical access controls effectively reduces the risk of piggybacking?
Which of the following physical access controls effectively reduces the risk of piggybacking?
The MOST effective biometric control system is the one:
The MOST effective biometric control system is the one: