Would the Security Technology Requirements document be used to determine a customer’s security requirements?

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?

A.
Prepare

B.
Plan

C.
Position

D.
Perform

E.
Design

F.
Develop



Leave a Reply 0

Your email address will not be published. Required fields are marked *