Refer to the exhibit. A junior engineer configured SNMP to network devices. Malicious users have uploaded different configurations to the network devices usingSNMP and TFTP servers. Which configuration prevents changes from unauthorized NMS and TFTP servers?