Joe, a company's network engineer, is concerned that protocols operating at the application layer of the OSI model are vulnerable to exploitation on the network. Which of the following protocols should he secure?

A. SNMP
B. SSL
C. ICMP
D. NetBIOS

Answer: B. SSL

Computer Science & Information Technology

You might also like to view...

App tiles enable you to move quickly between open apps by clicking on one of the thumbnails

Indicate whether the statement is true or false

Computer Science & Information Technology

Networks are structures in two principle ways: Client/server and ____

A. intranets B. host/slave C. Extranets D. peer- to- peer

Computer Science & Information Technology