This application is designed to ensure the privacy between the communicating parties. It ensures that no third party may eavesdrop or tamper with any messages between a server and a client. It also requires both the client and the server use certificates to verify their identities. SSL certificates have to be signed by a trusted Certificate Authority (CA) for it to be trusted by SSL type applications.
What will be an ideal response?
TLS
Computer Science & Information Technology
You might also like to view...
Which of these connection types would you most commonly associate with NAS?
A. Ethernet B. eSATA C. USB D. FireWire E. Serial
Computer Science & Information Technology
Name a scheduling algorithm where starvation is impossible?
What will be an ideal response?
Computer Science & Information Technology