Identification should include Layer 2 vulnerabilities and how these compromise LAN security.