What is needed to verify that a newly implemented security solution is performing as expected?
A.
A detailed physical and logical topology
B.
A cost analysis of the implemented solution
C.
Detailed logs from the AAA and SNMP servers
D.
Results from audit testing of the implemented solution