Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?
jeremy13
Highly Voted 1 year agoHenrikrp
Highly Voted 10 months agodesertlotus1211
Most Recent 2 weeks, 5 days agodesertlotus1211
2 weeks, 5 days ago[Removed]
4 months, 2 weeks agoinsaniunt
4 months, 3 weeks agosringan
6 months, 3 weeks agoTafulu
9 months agoVincent_Lu
10 months, 3 weeks agoThoHNguyen
9 months, 3 weeks agoVincent_Lu
10 months, 3 weeks agoboog
10 months, 3 weeks agoboog
10 months, 3 weeks agobellabop
1 year agoeli117
1 year ago581777a
8 months, 4 weeks ago