Homework Help: Questions and Answers: Which of the following would provide the best way to secure physical access to the server room inside a datacenter? (Choose two)
A. Biometric lock
B. Badge reader
C. USB token
D. Video surveillance
Answer:
First, let’s understand the question: We need to identify the two best methods for securing physical access to a server room in a datacenter.
Given Options: Step by Step Answering
a) Biometric Lock
- A biometric lock uses physical characteristics (fingerprints, iris scans, etc.) to grant access.
- This is highly secure because it ensures that only authorized individuals can enter based on their unique physical traits.
- This is an excellent method for securing physical access.
b) Badge Reader
- A badge reader scans an employee’s ID card or badge to grant access.
- This provides security but is not as strong as biometrics because badges can be lost or stolen. However, it is still a commonly used method for controlled access.
- This is a good method for securing physical access, especially when combined with other methods.
c) USB Token
- A USB token is typically used for digital authentication rather than physical access.
- It does not directly secure physical access to the server room but is more relevant for securing network or system access.
- This is not relevant for securing physical access to a server room.
d) Video Surveillance
- Cameras monitor the area around the server room.
- This helps with monitoring but does not directly prevent unauthorized access. It’s useful for recording incidents but cannot physically stop someone from entering.
- Video surveillance is helpful for monitoring but is not sufficient for securing access by itself.
Final Answer
Based on the above analysis, the two best options for securing physical access are:
a) Biometric Lock
b) Badge Reader
These methods actively control who can enter the server room. Video surveillance complements them but isn’t directly for access control.
Learn More: Homework Help
Q. Someone who intends to gain unauthorized access to a computer system is called a:
Q. Which of the following is an effective method to learn how to avoid viruses on your computer?