The ____ protocol is used for public-key encryption to secure a channel over the Internet.
A. RSA
B. IPSec
C. SSH
D. SSL
Answer: D
Computer Science & Information Technology
You might also like to view...
Which choice is not a description of a control?
A. Detective controls uncover attacks and prompt the action of preventative or corrective controls. B. Corrective controls always reduce the likelihood of a premeditated attack. C. Controls reduce the effect of an attack. D. Controls perform as the countermeasures for threats.
Computer Science & Information Technology
A(n) ________ window has two or four panes displaying the same worksheet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology