Watch this video on YouTube
During a system audit, you find that executable files can be run from the USB drive. Which policy should be implemented to mitigate this risk?