A company wants to enhance the defense against unauthorized access in its server room. Which of the following methods should be implemented to achieve the utmost assurance of restricting entry based on verifying unique individual traits?
Installation of surveillance cameras, known as closed-circuit television (CCTV), system around the server room
Biometric access control systems
Implementing coded access cards for secure doors
Maintaining sign-in logs at the entrance monitored by security personnel