COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This part of TLS can be used with or without encryption
A
handshake protocol
B
record protocol
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -After the TLS Handshake Protocol is used, the TLS Record Protocol ensures that the data exchanged between the parties isn’t altered en route. This protocol can be used with or without encryption, but TLS Record Protocol provides enhanced security using encryption methods like the Data Encryption Standard (DES).

Detailed explanation-2: -The TLS record protocol provides connection security, and the TLS handshake protocol enables the client and server to authenticate each other and negotiate security keys before data exchange.

Detailed explanation-3: -IMPLICIT SSL / EXPLICIT TLS HTTPS is an instance of Implicit SSL, which roughly means that SSL/TLS will be the outer most protocol layer of the connection. The first thing to be sent over the connection is a SSL/TLS handshake, and all application data will be sent encrypted.

There is 1 question to complete.