1. Describe three authentication types and give an example of each.

Your post should be at least 350 words.

2. Describe some ways that an organization can recover it’s IT resources from a disaster.  What controls should have been in place in order to be able to retrieve this data?

Your post should be at least 350 words.