What applications take advantage of a DTLS protocol?
A.
delay-sensitive applications, such as voice or video
B.
applications that require double encryption
C.
point-to-multipoint topology applications
D.
applications that are unable to use TLS
What applications take advantage of a DTLS protocol?
What applications take advantage of a DTLS protocol?
A.
delay-sensitive applications, such as voice or video
B.
applications that require double encryption
C.
point-to-multipoint topology applications
D.
applications that are unable to use TLS