Which of the following protocols is used to provide secure authentication and encryption over non- secure networks?

A. RADIUS
B. TLS
C. PPTP
D. HTTP


Answer: B. TLS

Computer Science & Information Technology

You might also like to view...

Which of the following is not a Java keyword?

a. do b. next c. while d. for

Computer Science & Information Technology

When a section of text needs to be repeated from one location to another in a document, you can use the ________ command rather than retyping the text

A) Copy B) Paste C) Cut D) Sort

Computer Science & Information Technology

When would you need to use the "is null" and "is not null" criteria?

What will be an ideal response?

Computer Science & Information Technology

Which one of the four keywords in SQL is used to determine how rows will be sorted?

A) ORDER BY B) SORT C) SELECT D) WHERE

Computer Science & Information Technology