Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter. The access records are used to identify which staff members accessed the data center in the event of equipment theft.
Which of the following MUST be prevented in order for this policy to be effective?
A . Password reuse
B . Phishing
C . Social engineering
D . Tailgating
Answer: D