____ is a means of encrypting a session between two hosts through the use of digital certificates, which are based on asymmetric key encryption.

A. CHAP
B. RADIUS
C. DMZ
D. SSL


Answer: D

Computer Science & Information Technology

You might also like to view...

Which technique involves each participant speaking or passing when it is his or her turn?

A. stratified sampling  B. unstructured brainstorming C. structured brainstorming D. systematic sampling

Computer Science & Information Technology

Which extension is used for translation files?

a. .cfg b. .po c. .conf d. .bin

Computer Science & Information Technology

In a hierarchically structured file system, the name of a file is formed by the pathname from the ________ to the file.

a) user directory b) base directory c) root directory d) relative directory

Computer Science & Information Technology

Discuss why it is helpful to think of items as instances of a class.

What will be an ideal response?

Computer Science & Information Technology