I am wondering about: (TCO E) name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology.
Explain reasons why the second four policies can't be enforced using technology and how managers could attempt to assure compliance