Which two components should be part of a security implementation plan? (Choose two.) Select 2 response(s).
A.
detailed list of personnel assigned to each task within the plan
B.
a Layer 2 spanning tree design topology
C.
rollback guidelines
D.
placing all unused access ports in VLAN 1 to proactively manage port security
E.
enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis