I hope this helps you, if it does please give me brainist answer =D
Answer:
The second step, which is to analyze the problem, involves gathering information, sorting through relevant and irrelevant information, and evaluating the source of the problem.
Explanation:
Answer:
The answer is below
Explanation :
If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.
This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."