This is a dedicated watch page for a single video.
You are auditing HDA Inc. as an information system auditor, and your objective is to determine if a firewall is configured in accordance with the organization's security policy. What is the most effective audit procedure to achieve this goal?