When creating a network security solution, which two pieces of information should you have
previously obtained to assist in designing the solution? (Choose two.)
A.
a list of existing network applications currently in use on the network
B.
network audit results to uncover any potential security holes
C.
a planned Layer 2 design solution
D.
a proof-of-concept plan
E.
device configuration templates