Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the OSI
model are vulnerable to exploitation on the network. Which of the following protocols should he secure?
A.
SNMP
B.
SSL
C.
ICMP
D.
NetBIOS