The ____ protocol is used for public-key encryption to secure a channel over the Internet.

A. RSA
B. IPSec
C. SSH
D. SSL

Answer: D

Computer Science & Information Technology

You might also like to view...

Which choice is not a description of a control?

A. Detective controls uncover attacks and prompt the action of preventative or corrective controls. B. Corrective controls always reduce the likelihood of a premeditated attack. C. Controls reduce the effect of an attack. D. Controls perform as the countermeasures for threats.

Computer Science & Information Technology

A(n) ________ window has two or four panes displaying the same worksheet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology