Questions:
Question 1 :
a) What control policy is required in order to prevent unauthorized access and damage to facilities?
b) Write 2 example controls that are required for securing Offices, Rooms, and Facilities.
Question 2 :
Give two examples for protecting the equipment in an organization?
Question 3:
Explain in the various threats (at least 2) of emails being sent over the internet or a network, and explain the techniques (at least 2) that use to protect the messages sent over emails?
Question 4:
Describe the activities involved in log management. How to select the appropriate data to log?