____ is used to guarantee a trust relationship among all network services that communicate with each other.

A. Certification Authority
B. SSH
C. SSL
D. TLS


Answer: A

Computer Science & Information Technology

You might also like to view...

Used toner cartridges, obsolete or broken hardware, and discarded CDs, DVDs, and other storage media are referred to as _________. A. system dispose B. e-dump C. electronic compost D. computing refuse

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you post your presentation online to Windows SkyDrive, viewers can access it using the PowerPoint Web App.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is not a recommendation for creating professional looking documents?

A) Stay with one size for all your text. B) Use boldface or underlining for emphasis. C) Use a maximum of two fonts. D) Avoid using underlining for emphasis

Computer Science & Information Technology

To initialize reference type variables, you usually create an object using the ____ operator.

A. & B. * C. + D. new

Computer Science & Information Technology