The ____ protocol is used for public-key encryption to secure a channel over the Internet.

A. RSA
B. IPSec
C. SSH
D. SSL


Answer: D

Computer Science & Information Technology

You might also like to view...

A variable declared in a function is also called a(n) ____ variable.

A. global B. scope C. illegal D. local

Computer Science & Information Technology

Which of these File Explorer views would be best if you are looking for a specific picture?

A) Small icons B) Medium icons C) Large icons D) Tiles

Computer Science & Information Technology

When you delete a record from a table, a dialog box displays to confirm the delete operation.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Authentication Header (AH) protocol is a part of what encryption protocol suite below?

A. TLS 3.0 B. IPSec C. GPG D. SSL

Computer Science & Information Technology