A security administrator must implement an authentication system for a high-security data center. The system must rely on physical characteristics that are highly resistant to false acceptances and difficult to replicate. Which of the following authentication methods should the administrator use to BEST meet these requirements?
Keypads requiring a pin code
Fingerprint recognition
Voice recognition
Iris recognition