Multiple Choice
With HTTPS,data are encrypted using a protocol called the ________.
A) Post Office Protocol (POP)
B) Secure Shell (SSH)
C) Secure Socket Layer (SSL)
D) File Transfer Protocol (FTP)
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: Adware and spyware are similar to each
Q9: Which of the following uses an individual's
Q10: Explain the two critical security functions that
Q11: _ occurs when computer criminals invade a
Q12: _ are small files that browsers store
Q14: Breaking into computers,servers,or networks to steal proprietary
Q15: Activity log analyses constitute an important _
Q17: Risk management is a critical security function
Q18: The existence of accounts that are no
Q18: Backup and physical security are _ against