1. Explain the difference between two-factor authentication and multifactor authentication. How are they used to secure information systems?
2. Choose one method of biometrics and explain how it works to secure information systems. In addition, describe how biometrics differs from other types of access control.
3. Explain the access controls needed to prevent piggybacking. What are the difficulties associated with implementing and maintaining these controls?
4. Provide three different areas of a building that need physical access controls. What types of access controls are needed for each of the three areas?