A network is deployed using best practices of the enterprise campus network model,
including users with desktop computers connected via IP phones. Given that all components
are QoS-capable, where are the two optimal locations for trust boundaries to be configured
by the network administrator? (Choose two.)
A.
host
B.
IP phone
C.
access layer switch
D.
distribution layer switch
E.
core layer switch