The point of penetration for an information technology room is controlled by_____.

The point of penetration for an information technology room is controlled by_____.