Which Authentication Encryption approach is taken by the SSL/TLS protocol?
(c).Authentication followed by encryption (A→E)
total answers (1)
start bookmarking useful questions and collections and save it into your own study-lists, login now to start creating your own collections.
(c).Authentication followed by encryption (A→E)
need an explanation for this answer? contact us directly to get an explanation for this answer