Threat monitoring in physical access security can be based upon which three of these?

Threat monitoring in physical access security can be based upon which three of these? (Choose three.)
A. doors
B. badges
C. age
D. weather
E. height
F. fingerprints

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.