Which of the following is a secure protocol that can be used to protect IM and presence information?

A. Password Authentication Protocol (PAP)
B. NT LAN Manager (NTLM)
C. Extensible Message and Presence Protocol (XMPP)
D. Challenge Authentication Protocol (CHAP)


C
Explanation: Extensible Messaging and Presence Protocol (XMPP) over TLS is an example of a secure messaging protocol.

Computer Science & Information Technology

You might also like to view...

The term ____ refers to the process of retrieving data from a file.

a. file connection b. file access c. stream connection d. stream access

Computer Science & Information Technology

Modifying the background color or inserting a picture on the slide background are ways to customize a slide.

a. true b. false

Computer Science & Information Technology

A weakness in a PC connected to the Internet or other network that permits an attacker to violate the integrity of the system is called a vulnerability.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Communication is a two-way process that involves both listening and responding.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology