A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,
where are the two optimal locations for trust boundaries to be configured by the network administrator?()
A.host
B.IP phone
C.access layer switch
D.distribution layer switch
E.core layer switch