Watch this video on YouTube
Which of the following is an example of an administrative control in cybersecurity?