Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second four policies can't be enforced using technology and how managers could attempt to assure compliance.