A small company is employing the topology below. Minimal security measures have been implemented. Possible vulnerabilities require to be discovered in any of the devices employed in the network architecture. This comprises routers, switches and workstations.