Multiple Choice
With https, data are encrypted using a protocol called the ________.
A) Secure Shell (SSH)
B) Secure Sockets Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q9: IP spoofing occurs when an intruder uses
Q30: The procedure of entrusting a party with
Q31: A key is a number used with
Q32: Which of the following is a primary
Q33: _ are viruses that masquerade as useful
Q34: All of the following are factors in
Q36: Spoofing is a technique for intercepting computer
Q38: A criticism of biometric authentication is that
Q39: _ are small files that browsers store
Q40: Risk management is a critical security function