For all the efforts a company can take to protect their assets and sensitive information, it may prove to be useless unless their systems are checked to ensure all areas of security are working properly and providing full protection. What would these checks be called?
Explanation
Answer: C - To ensure all security efforts of security are working properly and providing full protection, physical access auditing must take place. Physical access control systems can use software and auditing features to produce audit trails or access logs pertaining to access attempts. Information should be logged and reviewed for date and time of access attempt, the entry point at which access was attempted, the user ID employed during access attempt, and unsuccessful access attempts, especially during unauthorized hours.