This is a dedicated watch page for a single video.
You have been tasked with checking the implementation of security policies in the company. During the audit, you discover that a user from the IT department has a dial-out modem installed. Which of the following security policies should you review to determine whether dial-out modems are permitted?