Question

We know that TCP does not provide security services, but it can be enhanced with TLS...

We know that TCP does not provide security services, but it can be enhanced with TLS to do that. Answer the following: [ / 4] a) Does TLS operate at the transport layer or the application layer? b) Where does an application developer should write the TLS code? c) What security services TLS can provide? d) To what layer of the OSI protocol stack TLS belongs?

Homework Answers

Answer #1

a) TLS operates at the transport layer. In real life situations, it is mostly session layer operation because of its point-to-point security for sessions in transport.

b) TLS coding is server side coding. TLS protects the transfer of data from server to another server or client.

c) TLS provides many services. It is used to offer secure communication for emails, data transfers, internet faxing, etc.

d) It belongs to the Transport layer of OSI. It does help in the implementation of session start up, integrity, identity, and management.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
V At the completion of the chapter you should have an understanding of the following Chapter...
V At the completion of the chapter you should have an understanding of the following Chapter Objectives: What is the Purpose of a Network Model? What are the layers of the OSI Model? What are the characteristics of each layer of the OSI Model? How does the TCP/IP stack compare to the OSI Model? What are the Well Known TCP and/or UDP Port Numbers for a given collection of common applications? Define the Following Terms: Application Layer (OSI Model): Application...
Question 1911 pts Which of the following represents a layer-2 address? Group of answer choices 192.168.3.200...
Question 1911 pts Which of the following represents a layer-2 address? Group of answer choices 192.168.3.200 COMPUTER1 www.gleneclarke.com 00-02-3F-6B-25-13 Question 1921 pts What network protocol do Linux and Apple (Macintosh) systems most commonly use today? Group of answer choices AppleTalk IPX/SPX NetBIOS/NetBEUI TCP/IP Question 1931 pts Which of the following mnemonic devices can you use to remember the first letter of the name of each layer of the OSI model in the proper order? Group of answer choices All People...
The adage in psychology is that “correlation does not imply causation.” However, we know that smoking...
The adage in psychology is that “correlation does not imply causation.” However, we know that smoking cigarettes causes cancer, despite the fact that most of the evidence for this is correlational. Provide an example of a hypothetical study where correlation does not imply causation and what the researcher can do to further understand the nature of the correlation.
What tasks does the physician perform to provide health care services? Describe the specialties of family...
What tasks does the physician perform to provide health care services? Describe the specialties of family practitioners, pediatricians, and surgeons? Explain the difference between licensure and certification. What are some of the differences between LPNs and RNs? Describe one type of advanced practice nurse. What is a Nurse Practice Act? As a patient, do the demographic characteristics of health care provider (gender, race, age) make any difference to you? Should part of providers’ education include more diversity training? Why or...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees...
FinTechCo Case Study Company Overview FinTechCo is a medium-sized financial services company comprising of 45 employees with an annual revenue of $10 million. It has approximately 1000 customers comprising of private individuals and small companies. FinTechCo’s mission is to provide financial services and advice to its clients, to sell various products and services and offer consultation guidance regarding the information systems that support them. Problem Statement FinTechCo’s technical team were originally qualified financial planners who transitioned into technical roles and...
Instructions: In this course so far we have discovered stereotypes and how they can have an...
Instructions: In this course so far we have discovered stereotypes and how they can have an impact from the perspective of others. For this key assignment you will be conducting research and writing a paper on stereotypes and how they act as barriers to critical thinking. Please follow these guidelines and questions: Specifically you will be investigating and researching stereotypes that personally affect you or interest you. You could research stereotypes that affect you as a student, your gender, your...
I've posted this question like 3 times now and I can't seem to find someone that...
I've posted this question like 3 times now and I can't seem to find someone that is able to answer it. Please can someone help me code this? Thank you!! Programming Project #4 – Programmer Jones and the Temple of Gloom Part 1 The stack data structure plays a pivotal role in the design of computer games. Any algorithm that requires the user to retrace their steps is a perfect candidate for using a stack. In this simple game you...
Lab 5 Queries with Multiple Tables In this lab, we do queries more than one table....
Lab 5 Queries with Multiple Tables In this lab, we do queries more than one table. SQL provides two different techniques for querying data from multiple tables: • The SQL subquery • The SQL join As you will learn, although both work with multiple tables, they are used for slightly different purposes. We used WMCRM database which is what we created in Lab 4. Here is the summary of the database schema (where schema is used in its meaning of...
please can you make it simple. For example using scanner or hard coding when it is...
please can you make it simple. For example using scanner or hard coding when it is a good idea instead of arrays and that stuff.Please just make one program (or class) and explain step by step. Also it was given to me a txt.htm 1.- Write a client program and a server program to implement the following simplified HTTP protocol based on TCP service. Please make sure your program supports multiple clients. The webpage file CS3700.htm is provided. You may...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...