1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
1 year ago
8

a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al

gorithm-256 (sha-256) cipher. which ssl/tls version was deployed
Computers and Technology
1 answer:
tamaranim1 [39]1 year ago
8 0

The company deploys version TLS 1.2 of Secure Sockets Layer/Transport Layer Security (SSL/TLS).

TLS or Transport Layer Security is a cryptographic protocol primarily designed to provide communications security over computer networks. TLS  prototol has become a widely accepcpetd standard used by several devices such as computers, laptops, sensors, phones, meters, and IoT devices. The TLS 1.2 version of  TLS is the successor to Secure Sockets Layer (SSL), which is used by endpoint devices, applications, and software to authenticate and encrypt data securely when it is transmitted over a network.

Thus in the context of the given case, the organization deploys TLS 1.2 which is a version of Secure Sockets Layer/Transport Layer Security (SSL/TLS). The TLS 1.2 has the ability to support Secure Hashing Algorithms-256(SHA) cipher.

You can learn more about SSL/TLS at

brainly.com/question/22735795

#SPJ4

You might be interested in
When using a calculator be sure to press ____ first.​
matrenka [14]

Answer:

A. C to clear any previous calculations.

hope it helps...

6 0
3 years ago
Read 2 more answers
State four reasons why office automation is adopted in business establishment?​
olasank [31]

Answer:

The benefits of automated operations are higher productivity, reliability, availability, increased performance, and reduced operating costs.

Explanation:

6 0
3 years ago
The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another
dimulka [17.4K]

Answer:

My best answer would be, "b. Remove all possible contact points, and test again while ensuring only a single contact point"

This is because usually when the cursor jumps around without reason, it's caused by the user accidentally hitting the mouse touchpad on his or her laptop while typing. ... Similarly, know that just because you have an external mouse attached to your laptop, the built-in mousepad is not automatically disabled.

Brainliest?

4 0
3 years ago
in java A retail company must file a monthly sales tax report listing the total sales for the month and the amount of state and
qaws [65]

Answer:

  1. import java.util.Scanner;
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        System.out.print("Input total sales of month: ");
  6.        double totalSales = input.nextDouble();
  7.        double stateTax = totalSales * 0.04;
  8.        double countyTax = totalSales * 0.02;
  9.        double totalSalesTax = stateTax + countyTax;
  10.        System.out.println("County Tax: $" + countyTax);
  11.        System.out.println("State Tax: $" + stateTax);
  12.        System.out.println("Total Sales Tax: $" + totalSalesTax);
  13.    }
  14. }

Explanation:

Firstly, create a Scanner object and prompt user to input total sales of month (Line 5-7). Next, apply the appropriate tax rate to calculate the state tax, county tax (Line 9 - 10). Total up the state tax and county tax to get the total sales tax (Line 11).

At last, print the county tax, state tax and the total sales tax (Line 13 - 15).

8 0
3 years ago
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
vesna_86 [32]

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

4 0
2 years ago
Other questions:
  • How many inputs are included in the following requirement? REQUIREMENT: Write a program that asks the employee for their age. Th
    6·1 answer
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • Let C(x) be the statement "x has a cat," let D(x) be the statement "x has a dog," and let F(x) be the statement "x has a ferret.
    12·1 answer
  • If there is a circuit that is being used 36 CCS then how much of that circuit is being used in Erlang?
    8·1 answer
  • What is the main purpose of a graphic organizer?
    10·2 answers
  • Which cell formatting is most likely to use $?
    5·1 answer
  • One of the primary principles of the Rapid Application Development methodology is early prototyping of the _______ in the develo
    6·1 answer
  • Consider the following correct implementation of the selection sort algorithm.
    5·1 answer
  • Which command tells the for loop what to count by?
    9·2 answers
  • What would provide structured content that would indicate what the code is describing ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!