Refer to the exhibit.
An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols.
Which action prevents this type of attack in the future?
Click on the arrows to vote for the correct answer
A. B. C. D.A.