A security analyst is performing an audit on the network to determine if there are any deviations
from the security policies in place. The analyst discovers that a user from the IT department had a
dial-out modem installed. Which security policy must the security analyst check to see if dial-out
modems are allowed?
A.
Firewall-management policy
B.
Acceptable-use policy
C.
Remote-access policy
D.
Permissive policy