Which two components should be part of a security implementation plan? (Choose two.)
A.
detailed list of personnel assigned to each task within the plan
B.
a Layer 2 spanning tree design topology
C.
rollback guidelines
D.
placing all unused access ports in VLAN 1 to proactively manage port security
E.
enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
What you really need in any security implementation plan:
1 An incident response plan
2 The organization’s security policy
3 A list of customer requirements