Authentication methods, encryption, access control lists, protocols, firewalls, routers, IDSs and clipping levels are all examples of ______ or ______ controls?
1) Physical, logical
2) Biometric, cryptographic
3) Preventive, detective
4) Administrative, technical