What is an important step to take when verifying a newly proposed network security
solution?
A.
Test the design on a pilot network for expected results prior to implementing on the
production network.
B.
Run a network audit to determine types of traffic in use on the network.
C.
Launch campus updates into the production network and monitor impact to see if
configuration changes are needed.
D.
Create an interruption of data flow to determine test “back-door” access methods.