9/11/23
23. ARE COMMUNICATIONS TO AND FROM SYSTEMS VIA NETWORK COMMUNICATION EQUIPMENT LOGICALLY SECURED FROM UNAUTHORIZED ACCESS? (INQUIRY AND REVIEW SUPPORTING DOCUMENTATION)
33
(F) USER CONTROLS
34
17
Made with FlippingBook - Online catalogs