Joe, a company's network engineer, is concerned that protocols operating at the application layer of the OSI model are vulnerable to exploitation on the network. Which of the following protocols should he secure?
A. SNMP
B. SSL
C. ICMP
D. NetBIOS
Answer: B. SSL
Computer Science & Information Technology
You might also like to view...
App tiles enable you to move quickly between open apps by clicking on one of the thumbnails
Indicate whether the statement is true or false
Computer Science & Information Technology
Networks are structures in two principle ways: Client/server and ____
A. intranets B. host/slave C. Extranets D. peer- to- peer
Computer Science & Information Technology