During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()
A.Perform
B.Position
C.Develop
D.Prepare
E.Plan
F.Design