A security analyst is performing an audit on the network to determine if there are any deviations from the
security policies in place. The analyst discovers that a user from the IT department had a dial-out modem
installed. Which security policy must the security analyst check to see if dial-out modems are allowed?
A.
Firewall-management policy
B.
Acceptable-use policy
C.
Remote-access policy
D.
Permissive policy