During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()
A. Perform B. Position C. Develop D. Prepare E. Plan F. Desig