An organization uses RFID key fobs for door access. Which of the following features is typically provided by the access-control software that manages these fobs?
Automatic encryption of files stored on the workstation
Correct: Time-stamped audit logs allow administrators to see exactly which fob unlocked which door at what time, providing accountability and forensic evidence.
Incorrect options:
One-time passwords sent by SMS are associated with multifactor authentication for logical access, not physical key-fob readers.
File encryption is a workstation security measure unrelated to door controllers.
Rogue wireless-access-point detection is a network security task, not a standard feature of door-access systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do key fobs track user entries?
Open an interactive chat with Bash
What are the benefits of having an access control system with tracking features?
Open an interactive chat with Bash
What is the difference between an access control system and traditional locks?