CERTIFIED-IN-CYBERSECURITY · Question #329
CERTIFIED-IN-CYBERSECURITY Question #329: Real Exam Question with Answer & Explanation
The correct answer is D: Key cards. Key cards are designed to authenticate the identity of individuals entering a facility by requiring them to present a card with embedded information matched against a database of authorized users (see ISC2 Study Guide, Module 2, under Monitoring). Security guards and visitor sign
Question
Which of the following physical access control methods is designed to authenticate the identity of individuals entering a facility?
Options
- ASecurity guards
- BVisitor sign-in sheets
- CVideo surveillance
- DKey cards
Explanation
Key cards are designed to authenticate the identity of individuals entering a facility by requiring them to present a card with embedded information matched against a database of authorized users (see ISC2 Study Guide, Module 2, under Monitoring). Security guards and visitor sign-in sheets can help monitor and track access but do not authenticate identity. Video surveillance monitors and records activity within a facility but does not establish identity. Mechanical locks and keys are traditional physical access control methods that require a physical key to unlock a door.
Topics
Community Discussion
No community discussion yet for this question.