which of the following BEST describes an access control system which implements a non-trusted but secure zone immediately outside of the secure zone?