Outline a method by which DNS could be used to support encryption.

What will be an ideal response?


TXT resource records associated with a domain can include a public key.
This key can be used by clients as an encryption key to encode their public
key, which they then send to the server. Once both ends of the connection
have each other’s public key, a secure connection can be established.

Computer Science & Information Technology

You might also like to view...

MC The logical and operator ensures that______ .

a) two conditions are true. b) at least one condition is true. c) two conditions are false. d) None of the above.

Computer Science & Information Technology

You can press the ________ key to return to your document from Backstage view

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using the ________ tab on the File tab you can share your presentation files in a variety of ways, depending on whether or not your presentation file is saved locally, on a SharePoint site, or on SkyDrive

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ is created at the end of lines when you continue to type without entering a hard return

Fill in the blank(s) with correct word

Computer Science & Information Technology