When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
A. a list of existing network applications currently in use on the network
B. network audit results to uncover any potential security holes
C. a planned Layer 2 design solution
D. a proof-of-concept plan
E. device configuration template