1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
1 year ago
8

a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al

gorithm-256 (sha-256) cipher. which ssl/tls version was deployed
Computers and Technology
1 answer:
tamaranim1 [39]1 year ago
8 0

The company deploys version TLS 1.2 of Secure Sockets Layer/Transport Layer Security (SSL/TLS).

TLS or Transport Layer Security is a cryptographic protocol primarily designed to provide communications security over computer networks. TLS  prototol has become a widely accepcpetd standard used by several devices such as computers, laptops, sensors, phones, meters, and IoT devices. The TLS 1.2 version of  TLS is the successor to Secure Sockets Layer (SSL), which is used by endpoint devices, applications, and software to authenticate and encrypt data securely when it is transmitted over a network.

Thus in the context of the given case, the organization deploys TLS 1.2 which is a version of Secure Sockets Layer/Transport Layer Security (SSL/TLS). The TLS 1.2 has the ability to support Secure Hashing Algorithms-256(SHA) cipher.

You can learn more about SSL/TLS at

brainly.com/question/22735795

#SPJ4

You might be interested in
Universal Containers has a sales team focused on renewals. They will use many of the same Opportunity fields as other teams, but
ololo11 [35]

Stage Selected Values in the Sales Processes

Explanation:

A system administrator is the individual responsible for maintaining, configuring, and managing computer systems efficiently, particularly multi-user machines like servers.

Defining opportunities which comprise the selling process appropriately is one of the main functions for any company using Sales-force to monitor the performance of its sales process.

The Opportunity Stage Sales-force model off - the-box standards also reflect not the vocabulary or process that sales people use in the company As a result, Sales-force companies frequently make three main mistakes when describing their selling terminology.

6 0
3 years ago
Which of the following is part of the 6-by-6 rule?<br><br> i need help!!!!!
Digiron [165]
No more than six lines, and no more than six words in a 6 by 6 rule.
5 0
3 years ago
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
2 years ago
Which Ribbon contains the paragraph attributes?<br><br> Home<br> Insert<br> Review<br> View
Lemur [1.5K]
The Home ribbon contains the Paragraph attributes
7 0
3 years ago
Read 2 more answers
Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
gladu [14]

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

4 0
1 year ago
Other questions:
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to
    14·1 answer
  • ) How many switching functions of two variables (x and y) are there?
    11·1 answer
  • What is the main purpose of a graphic organizer?
    10·2 answers
  • How do I modify objects in power point 2016 for an assignment
    11·1 answer
  • Please I need help.
    12·1 answer
  • Pls help! for computers edge 2021
    7·1 answer
  • Creating a Numpy Array
    5·1 answer
  • How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?
    12·1 answer
  • Write a Java program that will be able to generate the sample table below.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!