During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()
A、Perform
B、Position
C、Develop
D、Prepare
E、Plan
F、Design