Joe, a company's network engineer, is concerned that protocols operating at the application layer of the OSI model are vulnerable to exploitation on the network. Which of the following protocols should he secure?
A. SNMP
B. SSL
C. ICMP
D. NetBIOS
Answer: B. SSL
You might also like to view...
Describe the zero-knowledge test.
What will be an ideal response?
Each time you paste, what is made of that saved version?
a. file b. copy c. type d. replace
The first field specified in the sorting process is called the ____________________ field.
Fill in the blank(s) with the appropriate word(s).
A company is building a two-tier web application to serve dynamic transaction-based content. The data tier is leveraging an Online Transactional Processing (OLTP) database. What services should you leverage to enable an elastic and scalable web tier?
A. Elastic Load Balancing, Amazon EC2, and Auto Scaling B. Elastic Load Balancing, Amazon RDS with Multi-AZ, and Amazon S3 C. Amazon RDS with Multi-AZ and Auto Scaling D. Amazon EC2, Amazon DynamoDB, and Amazon S3