Article https://www.eccouncil.org/cybersecurity/what-is-network-security/ Based

Article

Based on the article, select two network components and describe their vulnerabilities and the counter-measures.