Watch this video on YouTube
What would be the primary concern for an IS auditor reviewing a virtual private network (VPN) implementation, specifically regarding the location of computers on the network?