During a security audit of a company’s network, unsecure protocols were found to be in use. A network administrator wants to ensure browser-based access to company switches is using the most secure protocol. Which of the following protocols should be implemented?
A. SSH2
B. TLS1.2
C. SSL1.3
D. SNMPv3