A company wants to enhance the defense against unauthorized access in its server room. Which of the following methods should be implemented to achieve the utmost assurance of restricting entry based on verifying unique individual traits?
Biometric access control systems
Maintaining sign-in logs at the entrance monitored by security personnel
Implementing coded access cards for secure doors
Installation of surveillance cameras, known as closed-circuit television (CCTV), system around the server room
Implementing biometric access control systems is considered the highest standard for securing areas because it relies on verifying unique individual traits such as fingerprints or iris patterns, which are extremely difficult to duplicate, offering a superior level of security over other forms of access control. On the other hand, using coded access cards can be more vulnerable as they can potentially be stolen or cloned. While installing surveillance cameras, known fully as closed-circuit television (CCTV), can be a strong deterrent and provides a way to monitor and record entrance to facilities, it does not inherently prevent access. Likewise, sign-in logs offer visibility into who enters a server room but rely on manual verification and do not provide the same high level of security validation as biometric systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric access control systems?
Open an interactive chat with Bash
How do biometric systems compare to coded access cards?
Open an interactive chat with Bash
What are some common biometric methods used for access control?