What is a risk associated with attempting to control
physical access to sensitive areas, such as computer rooms,
through card keys, locks, etc.?

A. Unauthorized individuals wait for controlled doors to
open and walk in behind those authorized.

B. The contingency plan for the organization cannot
effectively test controlled access practices.

C. Access cards, keys, and pads can be easily duplicated
allowing easy compromise of the control.

D. Removing access for people no longer authorized is complex.

Answer Posted / guest

Answer: A

The concept of piggybacking compromises all physical control
established. Choice B would be of minimal concern in a
disaster recovery environment. Items in choice C are not
easily duplicated. Regarding choice D, technology is
constantly changing but card keys have existed for some time
and appear to be a viable option for the foreseeable future.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2843


purchase orders issued to vendors have been authorized as per the authorization matrix

1094