1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
1 year ago
8

a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al

gorithm-256 (sha-256) cipher. which ssl/tls version was deployed
Computers and Technology
1 answer:
tamaranim1 [39]1 year ago
8 0

The company deploys version TLS 1.2 of Secure Sockets Layer/Transport Layer Security (SSL/TLS).

TLS or Transport Layer Security is a cryptographic protocol primarily designed to provide communications security over computer networks. TLS  prototol has become a widely accepcpetd standard used by several devices such as computers, laptops, sensors, phones, meters, and IoT devices. The TLS 1.2 version of  TLS is the successor to Secure Sockets Layer (SSL), which is used by endpoint devices, applications, and software to authenticate and encrypt data securely when it is transmitted over a network.

Thus in the context of the given case, the organization deploys TLS 1.2 which is a version of Secure Sockets Layer/Transport Layer Security (SSL/TLS). The TLS 1.2 has the ability to support Secure Hashing Algorithms-256(SHA) cipher.

You can learn more about SSL/TLS at

brainly.com/question/22735795

#SPJ4

You might be interested in
. When a function template has two parameterized types, one as the return value, and one as an argument, then _____.
mart [117]

When a function template has two parameterized types, one as the return value, and one as an argument, then THE FIRST TIME MUST BE EXPLICITLY CODED.

Explanation:

  • The act of implicit and explicit coding, and implicit and explicit code, is defined by context of execution of additional behavior or type setting/casting. Specifically, implicit or explicit methods are defined by the contexts in which they are meant to be used.
  • The explicit coding discipline favors clear and explicit expression of intent in the code.
  • The uses-cases dictate the structure of the application. What the application does should not be implicitly hidden in an organization that the framework is trying to dictate you. Avoid having folders like /controllers, /views at the highest level of folders organization, in favor of folders containing features and use-cases: /categories, /products, etc.
  • Template parameter represents a type that has not yet been specified, but that can be used in the template function as if it were a regular type.

4 0
3 years ago
SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
VMariaS [17]

Answer:

True

Explanation:

Plz brainlist

5 0
2 years ago
Read 2 more answers
write a pseudo code and flow chart that take a number as input and prints multiplication table up to 10
Troyanec [42]

PSEUDOCODE:

1. DECLARE number: INTEGER

2. DECLARE multiple: INTEGER

3. INPUT number  

4. FOR counter FROM 1 TO 10 DO

5.     multiple <-- number * counter

6.     PRINT number, " * ", counter, " = ", multiple

7. ENDFOR


<em>1. declaring a variable "number" as an Integer</em>

<em>2. declaring a variable "multiple" as an Integer</em>

<em>3. The user inputs the value of number</em>

<em>4. FOR loop where variable "counter" increments by 1 after every iteration</em>

<em>5. sets the value for variable "multiple" as the value of number * counter</em>

<em>6. prints out for example "3 * 1 = 3" and will continue till counter reaches 10</em>

<em>7. Ends the for loop</em>

FLOWCHART below

hope it helped

8 0
3 years ago
Which method of deleting files can be used in windows xp and vista?
Makovka662 [10]
The correct answer is C.

4 0
3 years ago
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • Imported data that maintains a refreshable link to its external source is called ____ data.
    7·1 answer
  • While surfing online, Patricia checks her email and reads the latest messages. She then browsers a website and logs in a comment
    8·1 answer
  • What is something that can be done to help stop teen teen crashes
    8·1 answer
  • What are the three uses of a screw?​
    13·2 answers
  • Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
    10·1 answer
  • Can you explain the difference between software and hardware? Tell me 3 examples of each one.
    10·1 answer
  • What is the primary way that social networks work? Multiple Choice providing a security system for communication online connecti
    5·1 answer
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
  • 10.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!