![]() ![]() WA3) While anyone without THIS should be challenged, an attacker can use persuasion by using an excuse such as "I've forgotten my badge/key." An attacker could also forge the signature on THIS. WA2) Although THESE make it more difficult for someone to counterfeit the key, it is considered single factor authentication which can quite easily be compromised. However, they can be stolen, and counterfeited. Furthermore, a video camera can be used to allow a security guard to control the mantrap from a remote location. CA) THIS combines different security methods. D) Require ID badges to be shown to a security guard. ![]() ![]() C) Install a mantrap with video surveillance and require a smart card and a PIN. B) Install conventional locks on doors, and lockable rack cabinets. Which of these is the best way to secure the gateway to the data center as well as the data center itself? A) Install a biometric signature lock. You are responsible for implementing physical security prevention methods for your company's data center.
0 Comments
Leave a Reply. |