What considerations should a company make when selecting and training employees with authentication factors with biometric recognition? (Select all that apply.) - CORRECT ANSWERS-Setup and maintenance costs for biometric recognition are high.
Users find that biometric recognition invades privacy.
Biometric recognition technology can be discriminatory.
An attacker bypassed authentication controls to gain access to an authorized area of a company building. In order to help increase the physical security posture, determine the considerations the company must make when choosing and implementing a "something
you are" authentication factor with biometric recognition. (Select all that apply.) - CORRECT ANSWERS-Setup and maintenance costs for biometric recognition are high.
Biometric recognition technology can be discriminatory.
Users find that biometric recognition invades privacy.
Which of the following do asset tracking tags use to allow electronic surveillance of managed assets and help prevent theft of assets? - CORRECT ANSWERS-Radio Frequency Identification (RFID)
Employees at a gas station observe a potential hacker trying to install a malicious device in a credit card reader. Which of the following is a layer of security that could have been implemented to detect and alert this type of criminal activity? (Select all that apply.) - CORRECT ANSWERS-Duress alarm
Tamper detection
Circuit alarm
Which of the following makes it difficult for an individual to gain access to sensitive data,
supports local authentication, and can be combined with a smart card ID? - CORRECT ANSWERS-Biometrics