-Do you agree that deploying MFA only to executives is a secure approach to access management? Why or why not?
-Do you agree that requiring MFA for only some applications, regardless of user type, is a secure approach to access management? Why or why not?