During a remodel, a company's computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.
Which of the following processes would BEST satisfy this requirement?
eli117
Highly Voted 2 years, 7 months agoccryptix
Highly Voted 2 years, 7 months agoblacksheep6r
Most Recent 2 months, 4 weeks agoBiteSize
7 months, 1 week agoDelab202
7 months, 1 week ago23169fd
9 months, 3 weeks agoCASP_Master
1 year, 11 months agouser009
2 years, 1 month agoblehbleh
2 years, 1 month agoblehbleh
2 years, 1 month agoPeteUtah
2 years, 2 months agoFOURDUE
2 years, 3 months agoBoats
2 years, 7 months agoJackie2022
2 years, 8 months agoBig_Harambe
2 years, 8 months agophatboy
2 years, 8 months ago