Joe, a company’s network engineer, is concerned that protocols operating at the application layer of the
OSI model are vulnerable to exploitation on the network. Which of the following protocols should he
secure?

A.
SNMP
B.
SSL
C.
ICMP
D.
NetBIOS