During a security audit, Susan discovers that the organization is using hand geometry scanners as the access control mechanism for their secure data center. What recommendation should Susan make about the use of hand geometry scanners?
A. They have a high FRR and should be replaced.
B. A second factor should be added because they are not a good way to reliably distinguish individuals.
C. The hand geometry scanners provide appropriate security for the data center and should be considered for other high-security areas.
D. They may create accessibility concerns, and an alternate biometric system should be considered.
Answer: C. The hand geometry scanners provide appropriate security for the data center and should be considered for other high-security areas.
You might also like to view...
What are the differences between materialization and pipelining?
What will be an ideal response?
When you insert an aggregate function into a report, a calculated control for the ________ is interested in the Report Footer section
A) summary total B) grand total C) total D) group total
An adult day care facility provides a residence for disabled and elderly patients who need medical supervision or ongoing nursing care
Indicate whether the statement is true or false
Which virtual SCSI controller would be recommended when deploying a Windows Server 2012 R2 VM that will host a database server which is expected to generate high I/O?
A. LSI Logic B. PVSCSI C. LSI Logic SAS D. BusLogic