Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

A. TLS 1.2
B. SNMPv3
C. WPA2
D. SMTP

Answer: A. TLS 1.2

Computer Science & Information Technology

You might also like to view...

When a combo box's arrow is clicked, a list of items the user can choose is displayed

Indicate whether the statement is true or false

Computer Science & Information Technology

In addition to a fast CPU and a lot of RAM and storage, a graphics workstation requires a _______________.

A. large, high-quality monitor B. sound card C. fast network D. video editing software

Computer Science & Information Technology