1. When an individual user works in _____, the workstation
There are five tools that can be used by security