During a security audit, Susan discovers that the organization is using hand geometry scanners as the access control mechanism for their secure data center. What recommendation should Susan make about the use of hand geometry scanners?

A. They have a high FRR and should be replaced.
B. A second factor should be added because they are not a good way to reliably distinguish individuals.
C. The hand geometry scanners provide appropriate security for the data center and should be considered for other high-security areas.
D. They may create accessibility concerns, and an alternate biometric system should be considered.

Answer: C. The hand geometry scanners provide appropriate security for the data center and should be considered for other high-security areas.

Computer Science & Information Technology

You might also like to view...

The Customize Ribbon option is accessed from the ________ choice on the File tab

A) Options B) Export C) Share D) Info

Computer Science & Information Technology

What status indicators apply only to dynamic disks?

A. Foreign drive B. Unallocated C. Healthy (At Risk) D. Active

Computer Science & Information Technology