What are two factors you must consider when designing a network for security intelligence? (Choose two.)