cc video for an IT security consultant is conducting a review of a company's access control policy. In one scenario, an employee sends a print job to a network
An IT security consultant is conducting a review of a company's access control policy. In one scenario, an employee sends a print job to a network printer. How should the employee and the printer be categorized in the context of access control?