Exam 210-065 | Question id=3032 | Endpoint Configuration |
Threat monitoring in physical access security can be based upon which three of these?
A. |
doors | |
B. |
badges | |
C. |
age | |
D. |
weather | |
E. |
height | |
F. |
fingerprints |