Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?
Henrikrp
Highly Voted 1 year, 3 months agojeremy13
Highly Voted 1 year, 6 months agoMann098
Most Recent 3 months, 3 weeks agodesertlotus1211
6 months, 1 week agodesertlotus1211
6 months, 1 week ago[Removed]
10 months, 1 week agoinsaniunt
10 months, 2 weeks agosringan
1 year agoTafulu
1 year, 2 months agoVincent_Lu
1 year, 4 months agoThoHNguyen
1 year, 3 months agoVincent_Lu
1 year, 4 months agoboog
1 year, 4 months agoboog
1 year, 4 months agobellabop
1 year, 6 months agoeli117
1 year, 6 months ago581777a
1 year, 2 months ago