Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?
A. TLS 1.2
B. SNMPv3
C. WPA2
D. SMTP
Answer: A. TLS 1.2
Computer Science & Information Technology
You might also like to view...
When a combo box's arrow is clicked, a list of items the user can choose is displayed
Indicate whether the statement is true or false
Computer Science & Information Technology
In addition to a fast CPU and a lot of RAM and storage, a graphics workstation requires a _______________.
A. large, high-quality monitor B. sound card C. fast network D. video editing software
Computer Science & Information Technology