Which of the following questions must be answered before determining how much security your operating systems need? (Choose two.) What tools are used to attack the network? What costs are associated with security being breached? How likely is it that a threat will actually occur? How much data is on the network?