When creating a network security solution, which two pieces of information should you have obtained previously
to assist in designing the solution? (Choose two)
A.
A list of existing network applications currentlyin use on the network
B.
Network audit results to uncover any potential security holes
C.
A planned Layer 2 design solution
D.
A proof-of-concept plan
E.
Device configuration templates