What are two result of utilizing a fragmented security model? (Choose two.)
A. Reduced malicious file risk through additional segmentation.
B. Decreased network accessibility through multiple applications.
C. Decreased visibility and limited understand of security coverage.
D. Increased identity controls
E. Individual components pieced together to meet requirements.