During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?
A.
Prepare
B.
Plan
C.
Position
D.
Perform
E.
Design
F.
Develop