19 Mar Contrast auditing, logging, and log reading. How often should logs be reviewed? What information is pulled from these records?
1. Contrast auditing, logging, and log reading. How often should logs be reviewed? What information is pulled from these records?
Your response should be at least 75 words in length.
2. Explain the difference between two-factor authentication and multifactor authentication. How are they used to secure information systems?
Your response should be at least 75 words in length.
3. Provide three different areas of a building that need physical access controls. What types of access controls are needed for each of the three areas? Explain your choices.
Your response should be at least 75 words in length.
4. Explain the access controls needed to prevent piggybacking. What are the difficulties associated with implementing and maintaining these controls?
Your response should be at least 75 words in length.
