Which of the following BEST meets the criteria?

Posted by: Pdfprep Category: CAS-003 Tags: , ,

A secure facility has a server room that currently is controlled by a simple lock and key. and several administrators have copies of the key. To maintain regulatory compliance, a second lock, which is controlled by an application on the administrators’ smartphones, is purchased and installed. The application has various authentication methods that can be used.

The criteria for choosing the most appropriate method are:

• It cannot be invasive to the end user

• It must be utilized as a second factor.

• Information sharing must be avoided

• It must have a low false acceptance rate.

Which of the following BEST meets the criteria?
A . Facial recognition
B . Swipe pattern
C . Fingerprint scanning
D . Complex passcode
E . Token card

Answer: C

Leave a Reply

Your email address will not be published.