What are two requirements to enable centralized PoS applications? (Choose two.)
A.
physical security at the stores
B.
IP surveillance at the stores
C.
secure network infrastructure
D.
implementing intrusion prevention at the network edge of the stores
E.
reliable and highly available network infrastructure