Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
Which of the following should the security administrator implement to limit web traffic based on country of origin?