Which two components should be part of a security implementation plan? (Choose two)
A.
Detailed list of personnel assigned to each task within the plan
B.
A Layer 2 spanning-tree design topology
C.
Rollback guidelines
D.
Placing all unused access ports in VLAN 1 to proactively manage port security
E.
Enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis