Watch this video on YouTube
You are an information system auditor of HDA Inc. You are auditing the controls for visitor access to a data center. In this audit, what would be the most effective method for controlling visitor access to the data center?