During a remodel, a company's computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The company wants to be able to identify any unauthorized individuals who enter the storage room by following an authorized employee.
Which of the following processes would BEST satisfy this requirement?
eli117
Highly Voted 2 years, 7 months agoccryptix
Highly Voted 2 years, 6 months agoblacksheep6r
Most Recent 2 months, 3 weeks agoBiteSize
7 months agoDelab202
7 months ago23169fd
9 months, 2 weeks agoCASP_Master
1 year, 11 months agouser009
2 years agoblehbleh
2 years, 1 month agoblehbleh
2 years, 1 month agoPeteUtah
2 years, 2 months agoFOURDUE
2 years, 2 months agoBoats
2 years, 7 months agoJackie2022
2 years, 8 months agoBig_Harambe
2 years, 8 months agophatboy
2 years, 8 months ago