Which two actions, when taken in combination, will result in an effective network security solution? (Choose two.)
A.
Develop a policy for securing the network
B.
Monitor and test network activities for vulnerabilities
C.
Implement reflexive access lists
D.
Implement dynamic access lists
E.
Select and implement a single comprehensive virus protection program