1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
1 year ago
8

a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al

gorithm-256 (sha-256) cipher. which ssl/tls version was deployed
Computers and Technology
1 answer:
tamaranim1 [39]1 year ago
8 0

The company deploys version TLS 1.2 of Secure Sockets Layer/Transport Layer Security (SSL/TLS).

TLS or Transport Layer Security is a cryptographic protocol primarily designed to provide communications security over computer networks. TLS  prototol has become a widely accepcpetd standard used by several devices such as computers, laptops, sensors, phones, meters, and IoT devices. The TLS 1.2 version of  TLS is the successor to Secure Sockets Layer (SSL), which is used by endpoint devices, applications, and software to authenticate and encrypt data securely when it is transmitted over a network.

Thus in the context of the given case, the organization deploys TLS 1.2 which is a version of Secure Sockets Layer/Transport Layer Security (SSL/TLS). The TLS 1.2 has the ability to support Secure Hashing Algorithms-256(SHA) cipher.

You can learn more about SSL/TLS at

brainly.com/question/22735795

#SPJ4

You might be interested in
Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
Kay [80]

Answer:

<u>False</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The Intel Centrino Technology is a product marketed and sold by the tech giant Intel, which offers a combination of their Wi-Fi and WiMax technologies in a single personal laptop. It does not offer Hyper threading Technology (HT) like some of the other Intel branded CPU's. Some of the CPU's that include hyper threading are the Core I3 series.

Therefore, based on the information stated above, we can see that the statement in the question in <u>False</u>.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

7 0
2 years ago
25 POINTS!!!!!!!!!!!!!
Paladinen [302]
A leaking data exhaust
7 0
2 years ago
Read 2 more answers
File "f2" has a size of 2. Why? A. It contains the string "f1". B. It contains two blank lines.
Aneli [31]

Answer:

A. It contains the string "f1"

7 0
2 years ago
Identify a syntax used to create a spinner control using an input element. a. b. c. d.
Lorico [155]

Answer:

Option A:

<input name="name" id="id" type="number" value="value" step="value" min="value" max="value" />

Explanation:

Spinner control is a graphical control element where user can adjust the value by pressing up or down arrow button. An example is given in the attached image.

In HTML, one of the key attributes we must use to create a spinner control is "step". The attribute "step" is required to specify the interval of the step value when user press the up or down arrow button.

If we set the attribute values as follows:

  • type = "number"
  • value = 2
  • min = 0
  • max = 10

The setting above will give a spinner control with a range of legal numbers between 0, 2, 4, 6, 8 and 10.

6 0
2 years ago
Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.
Tatiana [17]

Dictary = {

'code':6734,

'dept': 'sales',

123-45-6789:"Mr.Potato Head \n234 Potato Lane \nPotato Chip, ID 77725"

}

for i in Dictary.keys():

   if i == 123-45-6789:

       print(Dictary.get(i))

       break

else:

   print("Key not found")

You can further test this code by deleting Mr.Potato head's info from the dictionary. I hope this helps!

4 0
2 years ago
Other questions:
  • If johanna wants to label the x- and y-axes, she should click Layout, then
    8·1 answer
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • Linux would be a good example of?
    6·1 answer
  • In an AND truth table.
    7·1 answer
  • For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
    6·1 answer
  • What is the purpose of a forecast worksheet?
    15·1 answer
  • What is the difference between autofocus and autocomplete
    8·1 answer
  • Sharing resources.
    14·1 answer
  • One way to check if a website is secure is to look for a/an<br> in the address bar.
    10·1 answer
  • when an overridden method is called from within a subclass, it will always refer to the version of that method defined by the (a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!