Sign Up
Log In
Home
discussion
Exam 210-065 Question id=3032 Endpoint Configuration

Threat monitoring in physical access security can be based upon which three of these?

A. doors
B. badges
C. age
D. weather
E. height
F. fingerprints