This is a dedicated watch page for a single video.
An IT security consultant is conducting a review of a company's access control policy. In one scenario, an employee sends a print job to a network printer. How should the employee and the printer be categorized in the context of access control?