A security analyst is reviewing the following packet capture of communication between a host and a company's router:
Which of the following actions should the security analyst take to remove this vulnerability?
Click on the arrows to vote for the correct answer
A. B. C. D. E.B.