1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
4 years ago
5

Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha

t there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
A. SSH
B. TLS
C. X.509
D. RSH
Computers and Technology
1 answer:
andrezito [222]4 years ago
4 0

Answer:

B) TLS (Transport Layer Security)

Explanation:

SSL refers to secured socket layer, while TLS refers to Transport Layer Security. They are both security measures implementing crytography to ensure secured communication on a network especially in web and electronic mails. While very minor technical differences exist between these two protocols, SSL is veiwed as outdated because TLS uses stronger algorithms for encryption. The SSL is also unable to work on different ports unlike TLS.

You might be interested in
On the Direct Marketing worksheet, create appropriate range names for Design Fee (cell B8), Cost Per Ad (cell B9), Total Clicks
Inessa [10]

Answer:

See explanation below

Explanation:

Named ranges are a very important tool in Microsoft Excel. It is used in assigning a name to a particular number of cells. It is great for automation and makes formula much easy to understand and use.

One way to create named ranges is theory the Name Box.

To create named ranges in the design marketing sheet we do this;

1) We click on cell B8 and then navigate to the name box at the top right corner of the sheet just above the column A.

•The name box is where the cell address of any cell that is active is displayed.

•You would see that “B8” is displayed on the name box.

• Double click on the name box and type in the appropriate name, in this case - Design_Fee.

• Press enter and you have your named range.

You do the same for the other named ranges.

Note that: Named ranges must contain letters, numbers or underscore.

4 0
3 years ago
Gini is a manager at a website design firm. She has a timeline prepared for the product to be delivered to the client. She needs
Grace [21]

Answer:

The correct answer is letter "A": controlling.

Explanation:

There are four (4) basic management skills: <em>Planning, Controlling, Organizing, </em>and <em>Leading.  </em>

Controlling implies reviewing the objectives the firm has established to evaluate the progress. It also involves measuring the resources the firm has available for reaching its goals and verifying if they will be enough to get to the finish line, otherwise, the company should find more efficient forms of allocating resources and funding its operations.

In other words, <em>the controlling skill of management sets the standards of performance within the institution.</em>

7 0
3 years ago
Read 2 more answers
What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
Sever21 [200]
The money their making
6 0
4 years ago
The use of logistics software at DCS (7 points)
Charra [1.4K]

Answer:18 th Century

Explanation:

3 0
3 years ago
Computer programming 2
yarga [219]
Here is the second photo

6 0
3 years ago
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    11·1 answer
  • Steve wants to become a successful graphic design entrepreneur. Which entrepreneurial approach will help him succeed? A. working
    14·1 answer
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • What kind of java program runs within a java-enabled browser?
    15·1 answer
  • 3.
    5·1 answer
  • Whenever you press a key, click the mouse or start an application, you're sending instructions tow
    9·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
  • What is the Cycle of Dependency?
    14·1 answer
  • How does a computer do its work? Mention its working principle.<br><br>​
    8·1 answer
  • Give an example of how loops are used in programming Kturtle​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!