Which three statements are true about TLS? (Choose three.)
A.
TLS protocol uses a MAC to protect the message integrity.
B.
TLS data encryption is provided by the use of asymmetric cryptography.
C.
The identity of a TLS peer can be authenticated using public key or asymmetric cryptography.
D.
TLS protocol is originally based on the SSL 3.0 protocol specification.
E.
TLS provides support for confidentiality, authentication, and nonrepudiation.
Explanation: