An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution?
(Choose two.)
A. Enable Certificate Signing Request in Cisco Intersight
B. Add a trusted root LDAP certificate to Cisco Intersight
C. Enable Encryption for LDAP
D. Add a self-signed LDAP certificate to Cisco Intersight
E. Add a trusted OAuth token to Cisco Intersight