What is typically used to create a security trap in the data center facility?
- IDs, biometrics, and two access doors
- high resolution monitors
- redundant authentication servers
- a server without all security patches applied
Explanation: Security traps provide access to the data halls where data center data is stored. As shown in the figure below, a security trap is similar to an air lock. A person must first enter the security trap using their badge ID proximity card. After the person is inside the security trap, facial recognition, fingerprints, or other biometric verifications are used to open the second door. The user must repeat the process to exit the data hall.
More Questions: Network Security Final Exam Answers