1. In your opinion, what defines the limits within the User Domain and validates user activities that would provide an important security layer in a defense-in-depth approach to system security.
2. Discuss this statement: All of the domains in the IT infrastructure are important. Although it might be difficult to highlight any one domain over the others, the LAN Domain does tend to be where much of an organizations critical data resides. What is in the LAN Domain that makes this statement true?