This is a dedicated watch page for a single video.
The network administrator has been assigned the task of eliminating all unencrypted traffic within the company's network. During the analysis, unencrypted traffic was detected on UDP port 161. Which protocol uses this port, and what steps should the network administrator take to address the issue?