What is needed to verify that a newly implemented security solution is performing as expected? ()
A.a detailed physical and logical topology
B.a cost analysis of the implemented solution
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution