Identify a protocol that allows data to be privately exchanged over public networks.
a. SSL
b. TCP
c. IP
d. None of the above
a. SSL
Computer Science & Information Technology
You might also like to view...
____________________ management data allows corporations to better judge security risks.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?
a. Router b. Multiport repeater c. Token passer d. Token-ring hub
Computer Science & Information Technology