During a remodel, a company's computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.
Which of the following processes would BEST satisfy this requirement?
eli117
Highly Voted 2 years, 9 months agoccryptix
Highly Voted 2 years, 9 months agoBluedegard2_111
Most Recent 3 weeks, 4 days agoblacksheep6r
4 months, 3 weeks agoBiteSize
9 months, 1 week agoDelab202
9 months, 1 week ago23169fd
11 months, 3 weeks agoCASP_Master
2 years, 1 month agouser009
2 years, 3 months agoblehbleh
2 years, 3 months agoblehbleh
2 years, 3 months agoPeteUtah
2 years, 4 months agoFOURDUE
2 years, 5 months agoBoats
2 years, 9 months agoJackie2022
2 years, 10 months agoBig_Harambe
2 years, 10 months agophatboy
2 years, 10 months ago