Question 1: Take a position on whether social engineering tactics can defeat any technology controls implemented in the information systems environment.
Support your position with evidence and rationalize your answer with examples.
Question 2: Imagine your manager does not want to spend the money on setting up a server at a remote location for logging mission-critical security logs, audit trails and video feeds.
Q: Write him a brief note that explains why keeping all applications and security servers in the same data center could compromise the organization
Describe why keeping all security servers and applications in the same data center could compromise the organization