Describe physical access control.
Discuss any form of physical access control, and reference a time when you have used this form of physical access control to provide security to an information asset.
Describe logical access control.
Discuss any form of logical access control you have used, and discuss a situation in which you have leveraged this form of logical access control to provide security protection for an information asset.
Be specific in your response