Which of the following is the MOST effective at preventing an unauthorized individual from following an authorized person through a secured entrance (tailgating or piggybacking)?
An information security manager reviewing firewall rules will be MOST concerned if the firewall allows: