Which three descriptions are true with regard to the perimeter-endpoint security architecture?
(Choose three.)
A.
The architecture is easy to operate and to maintain and is flexible for adding new services
B.
The network is partitioned into security domains
C.
The architecture uses a restrictive access model
D.
The architecture offers integration of network and endpoint security