A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator? (Choose two.) *
A.
host
B.
IP phone
C.
access layer switch
D.
distribution layer switch
E.
core layer switch