Which of the following protocols is used to provide secure authentication and encryption over non- secure networks?
A. RADIUS
B. TLS
C. PPTP
D. HTTP
Answer: B. TLS
Computer Science & Information Technology
You might also like to view...
Which of the following is not a Java keyword?
a. do b. next c. while d. for
Computer Science & Information Technology
When a section of text needs to be repeated from one location to another in a document, you can use the ________ command rather than retyping the text
A) Copy B) Paste C) Cut D) Sort
Computer Science & Information Technology
When would you need to use the "is null" and "is not null" criteria?
What will be an ideal response?
Computer Science & Information Technology
Which one of the four keywords in SQL is used to determine how rows will be sorted?
A) ORDER BY B) SORT C) SELECT D) WHERE
Computer Science & Information Technology