What is secured sucket layer and what is the requirement of
its in networking

Answers were Sorted based on User's Feedback



What is secured sucket layer and what is the requirement of its in networking..

Answer / praveen rai

The secure socket layer protocol runs above the TCP/IP and
below higher level protocols such as HTTP or IMAP .SSL uses
TCP/IP on behalf of other higher protocols and in the
process allows and ssl enabled server to authenticate itlsef
to an ssl enabled client the client then atthenticates
itself to the server and both machine establish an encrypted
connection ssl works on port 443 .

there are two sub protocols for ssl record layer protocol
and handshake protocol .the later version of ssl is call tls
now

Is This Answer Correct ?    17 Yes 2 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / bill gates

evryone is reuning name of ma company n ma fake too
available here......its bill gates here......roflmaoooooo

Is This Answer Correct ?    2 Yes 0 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / subasheelaq

it is used to send packet of data from sender to receiver.
it issecured sacket. it is used in tcp/ip protocols.

Is This Answer Correct ?    1 Yes 1 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / bill gates

Vinay kumar looks like a microsoft socket maker created by
bill gates. LOL

Is This Answer Correct ?    1 Yes 2 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / guest

It is a socket ,created by vinay kuymar, any dout?

Is This Answer Correct ?    1 Yes 4 No

Post New Answer

More Networking Security Interview Questions

What is malware?

0 Answers  


What is proxy firewall?

0 Answers  


What is an information security management system (isms)?

0 Answers  


What is difference between baseband and broadband transmission

0 Answers   Elgi Equipments,


What are the different Kinds of Malware?

1 Answers   Infosys,






What is adware?

0 Answers  


What is IPCONFIG command? Why it is used?

0 Answers  


Explain what is the role of single sign on in authentication technologies?

0 Answers  


What is kerberos protocol?

0 Answers  


what purpose we are using the ARP ? what purposes we are using ip config?

7 Answers  


What is the general data protection regulation (gdpr)?

0 Answers  


What is secure remote access?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)