TLS requires both the client and the server use these to verify their identities.

What will be an ideal response?

certificates

Computer Science & Information Technology

You might also like to view...

Another name for the notification area on the right side of the taskbar that displays the status of your computer, shortcuts, and a clock is the:

A) system tray B) Quick Launch toolbar C) taskbar D) Windows Sidebar

Computer Science & Information Technology

____ are defects in application and system software that can be exploited by a threat.

A. Threats B. Vulnerabilities C. Risks D. Patches

Computer Science & Information Technology