Joe, a company’s network engineer, is concerned that protocols operating at the application layer
of the OSI model are vulnerable to exploitation on the network. Which of the following protocols
should he secure?

A.
SNMP
B.
SSL
C.
ICMP
D.
NetBIOS