![](https://cos-cdn.shuashuati.com/pipixue-wap/2020-1230-1107-56/ti_inject-812ce.png)
Which two actions, when taken in combination, will result in an effective network security solution?()
A.
develop a policy for securing the network
B.
monitor and test network activities for vulnerabilities
C.
implement reflexive access lists
D.
implement dynamic access lists
E.
select and implement a single comprehensive virus protection program