Which of the following protocols should he secure?

Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the OSI
model are vulnerable to exploitation on the network. Which of the following protocols should he secure?

Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the OSI
model are vulnerable to exploitation on the network. Which of the following protocols should he secure?

A.
SNMP

B.
SSL

C.
ICMP

D.
NetBIOS



Leave a Reply 0

Your email address will not be published. Required fields are marked *