Most IT and IAS professionals are familiar with the basic concepts surrounding authentication and access control systems. There are fewer professionals who have taken the time to consider the more granular characteristics of these controls and the options that are available for differentiation, selection, and implementation. Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following: Describe the combination of authentication and access controls that you believe best balance cost, complexity, and security. Support your position. Explain how domain trusts, isolation technologies, and the separation and organization of those technologies can support a network security strategy. Describe an example of how encapsulation or encryption contribute to a specific access control or authentication solution.