.Which two statements represent physical security guidelines that should be followed during Cisco security deployment? (Choose two.)
A. Potential security breaches should be evaluated.
B. Network equipment should be accessed remotely with Secure Socket Layer (SSL) instead of Telnet.
C. Images should be managed using File Transfer Protocol (FTP) and Secure FTP (SFTP) instead of Trivial File Transfer Protocol (TFTP).
D. Simple Network Management Protocol version 3 (SNMPv3) should be used for security and privacy features.
E. The potential impact of stolen network resources and equipment should be assessed.