96.6k views
3 votes
A secure facility has a server room that currently is controlled by a simple lock and key, and several administrators have copies of the key. To maintain regulatory compliance, a second lock, which is controlled by an application on the administrators' smartphones, is purchased and installed. The application has various authentication methods that can be used. The criteria for choosing the most appropriate method are:

✑ It cannot be invasive to the end user.
✑ It must be utilized as a second factor.
✑ Information sharing must be avoided.
✑ It must have a low false acceptance rate.

Which of the following BEST meets the criteria?

A. Facial recognition
B. Swipe pattern
C. Fingerprint scanning
D. Complex passcode
E. Token card

User Eben Geer
by
7.7k points

1 Answer

4 votes

Final answer:

The most appropriate authentication method that meets all the specified criteria is a complex passcode. It is non-invasive, adds a second layer of security, does not share personal information, and has a low false acceptance rate.

Step-by-step explanation:

The best authentication method for the secure facility's server room that meets the criteria of being non-invasive, a second factor, not sharing information, and having a low false acceptance rate is D. Complex passcode. A complex passcode does not require any invasive biometric scans such as fingerprint or facial recognition, which makes it non-invasive.

As a second factor, it adds an additional layer of security beyond the physical key without requiring any biometric data that could be considered invasive or sharing personal information. Complex passcodes also provide a high level of security with a low false acceptance rate, ensuring that unauthorized individuals are unlikely to guess or replicate the passcode.

User Bajrang
by
7.9k points