Joe, a company's network engineer, is concerned that protocols operating at the application layer of the OSI model are vulnerable to exploitation on the network. Which of the following protocols should he secure?

A. SNMP
B. SSL
C. ICMP
D. NetBIOS


Answer: B. SSL

Computer Science & Information Technology

You might also like to view...

Describe the zero-knowledge test.

What will be an ideal response?

Computer Science & Information Technology

Each time you paste, what is made of that saved version?

a. file b. copy c. type d. replace

Computer Science & Information Technology

The first field specified in the sorting process is called the ____________________ field.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A company is building a two-tier web application to serve dynamic transaction-based content. The data tier is leveraging an Online Transactional Processing (OLTP) database. What services should you leverage to enable an elastic and scalable web tier?

A. Elastic Load Balancing, Amazon EC2, and Auto Scaling B. Elastic Load Balancing, Amazon RDS with Multi-AZ, and Amazon S3 C. Amazon RDS with Multi-AZ and Auto Scaling D. Amazon EC2, Amazon DynamoDB, and Amazon S3

Computer Science & Information Technology