ethical-hacker video for you have been tasked with checking the implementation of security policies in the company. During the audit, you discover that a user
You have been tasked with checking the implementation of security policies in the company. During the audit, you discover that a user from the IT department has a dial-out modem installed. Which of the following security policies should you review to determine whether dial-out modems are permitted?