Questions:
Question 1 : 
a) What control policy is required in order to prevent unauthorized access and damage to facilities?
b) Write 2 example controls that are required for securing Offices, Rooms, and Facilities.
Question  2  :
 Give two examples for protecting the equipment in an organization?
Question  3:   
Explain in the various threats (at least 2) of emails being sent over the internet or a network, and  explain the techniques (at least 2) that use to protect the messages sent over emails?
Question  4:
Describe the activities involved in log management. How to select the appropriate data to log?