An organization uses RFID key fobs for door access. Which of the following features is typically provided by the access-control software that manages these fobs?
One-time passwords sent by SMS
Detection of rogue wireless access points
Time-stamped audit logs for each door entry
Automatic encryption of files stored on the workstation
Correct: Time-stamped audit logs allow administrators to see exactly which fob unlocked which door at what time, providing accountability and forensic evidence.
Incorrect options:
One-time passwords sent by SMS are associated with multifactor authentication for logical access, not physical key-fob readers.
File encryption is a workstation security measure unrelated to door controllers.
Rogue wireless-access-point detection is a network security task, not a standard feature of door-access systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do RFID key fobs work for door access?
Open an interactive chat with Bash
What are time-stamped audit logs, and why are they important for access control?
Open an interactive chat with Bash
What distinguishes RFID access control from other security technologies like biometric scanners?