A network is deployed using best practices of the enterprise campus network model,
including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator? (Choose two.)
Select 2 response(s).
A.
host
B.
IP phone
C.
access layer switch
D.
distribution layer switch
E.
core layer switch