Which of the following is a secure protocol that can be used to protect IM and presence information?
A. Password Authentication Protocol (PAP)
B. NT LAN Manager (NTLM)
C. Extensible Message and Presence Protocol (XMPP)
D. Challenge Authentication Protocol (CHAP)
C
Explanation: Extensible Messaging and Presence Protocol (XMPP) over TLS is an example of a secure messaging protocol.
You might also like to view...
The term ____ refers to the process of retrieving data from a file.
a. file connection b. file access c. stream connection d. stream access
Modifying the background color or inserting a picture on the slide background are ways to customize a slide.
a. true b. false
A weakness in a PC connected to the Internet or other network that permits an attacker to violate the integrity of the system is called a vulnerability.
Answer the following statement true (T) or false (F)
Communication is a two-way process that involves both listening and responding.
Answer the following statement true (T) or false (F)