Which two considerations about secure network monitoring are important? (Choose two.)
A.
log tampering
B.
encryption algorithm strength
C.
accurate time stamping
D.
off-site storage
E.
Use RADIUS for router commands authorization.
F.
Do not use a loopback interface for device management access.