Answer to Question 1
B
Answer to Question 2
Access control
Telecommunications and network security
Information security governance and risk management
Software development security
Cryptography
Security architecture and design
Operations security
Business continuity and disaster recovery planning
Legal regulations and compliance
Physical security.