Identification includes approaches to securing peripheral devices and should include, but not be limited to,

Process/Skill Questions: