A security administrator must implement an authentication system for a high-security data center. The system must rely on physical characteristics that are highly resistant to false acceptances and difficult to replicate. Which of the following authentication methods should the administrator use to BEST meet these requirements?
Voice recognition
Fingerprint recognition
Keypads requiring a pin code
Iris recognition