When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates