Discussion Board Review Question Description What is unique about these protocols? In othe …

Discussion Board ReviewQuestion Description What is unique about these protocols? In other words, what commonvulnerability do each of these possess? From a defense in depth perspective, how would you mitigate this common heldvulnerability?
Please see attached.Deliverable length: 400-600 words