This is a dedicated watch page for a single video.
Henry, a security professional in an organization, recently noticed that someone was remotely controlling the network devices in the organization. After thorough research, he found that an attacker took advantage of SNMP vulnerabilities to gain access to the systems. Which of the following countermeasures should Henry follow to secure the organization from SNMP enumeration?