What is needed to verify that a newly implemented security solution is performing as
expected?
A.
a detailed physical and logical topology
B.
a cost analysis of the implemented solution
C.
detailed logs from the AAA and SNMP servers
D.
results from audit testing of the implemented solution