| Exam 210-065 | Question id=3032 | Endpoint Configuration |
Threat monitoring in physical access security can be based upon which three of these?
| A. |
doors | |
| B. |
badges | |
| C. |
age | |
| D. |
weather | |
| E. |
height | |
| F. |
fingerprints |