a user is implementing security on a small office network. which two actions would provide the minimum security requirements for this network? (choose two.)