You must create a vulnerability management framework. Which main purpose of this framework is true? A. Conduct vulnerability scans on the network. B. Manage a list of reported vulnerabilities. C. Identify remove and mitigate system vulnerabilities. D. Detect and remove…

Refer to the exhibit. A TFTP server has recently been installed in the Atlanta office. The network administrator is located in the NY office and has attempted to make a connection to the TFTP server. They are unable to backup…