Which two actions, when taken in combination, will result in an effective network security solution?()
A. develop a policy for securing the network
B. monitor and test network activities for vulnerabilities
C. implement reflexive access lists
D. implement dynamic access lists
E. select and implement a single comprehensive virus protection program