When auditing the security architecture of an e-commerce environment, an IS auditor should FIRST review the:
A. configuration of the firewall
B. alternate firewall arrangements
C. location of the firewall within the network
D. criteria used for selecting the firewall
A. configuration of the firewall
B. alternate firewall arrangements
C. location of the firewall within the network
D. criteria used for selecting the firewall