A network is deployed using recommended practices of the enterprise campus network model, including users
with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the
two optimal locations for trust boundaries to be configured by the network administrator? (Choose two)
A.
Host
B.
IP phone
C.
Access layer switch
D.
Distribution layer switch
E.
Core layer switch