nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #329

CERTIFIED-IN-CYBERSECURITY Question #329: Real Exam Question with Answer & Explanation

The correct answer is D: Key cards. Key cards are designed to authenticate the identity of individuals entering a facility by requiring them to present a card with embedded information matched against a database of authorized users (see ISC2 Study Guide, Module 2, under Monitoring). Security guards and visitor sign

Access Controls Concepts

Question

Which of the following physical access control methods is designed to authenticate the identity of individuals entering a facility?

Options

  • ASecurity guards
  • BVisitor sign-in sheets
  • CVideo surveillance
  • DKey cards

Explanation

Key cards are designed to authenticate the identity of individuals entering a facility by requiring them to present a card with embedded information matched against a database of authorized users (see ISC2 Study Guide, Module 2, under Monitoring). Security guards and visitor sign-in sheets can help monitor and track access but do not authenticate identity. Video surveillance monitors and records activity within a facility but does not establish identity. Mechanical locks and keys are traditional physical access control methods that require a physical key to unlock a door.

Topics

#Physical Access Control#Authentication#Physical Security#Access Control Methods

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions