The FIRST step in establishing a firewall security policy is to determine the:
A. necessary logical access rights.
B. expected data throughput.
C. business requirements.
D. existing firewall configuration.
A. necessary logical access rights.
B. expected data throughput.
C. business requirements.
D. existing firewall configuration.