Which two should be included in an analysis of a security posture assessment? (Choose two.)
A.
Identification of bottlenecks inside the network
B.
Recommendations based on security best practice
C.
Identification of critical deficiencies
D.
Service offer
E.
Detailed action plan