An organization suffered significant damage to its local file and application servers as a result of a hurricane. Fortunately, the organization was able to recover all information backed up by its overseas third-party contractor.
Which of the following approaches has been used by the organization?
An internal auditor is completing an access control assessment of a telecommunication organization’s offsite facility. Which of the following physical security measures would best prevent unauthorized access to the facility?