What is secured sucket layer and what is the requirement of
its in networking

Answers were Sorted based on User's Feedback



What is secured sucket layer and what is the requirement of its in networking..

Answer / praveen rai

The secure socket layer protocol runs above the TCP/IP and
below higher level protocols such as HTTP or IMAP .SSL uses
TCP/IP on behalf of other higher protocols and in the
process allows and ssl enabled server to authenticate itlsef
to an ssl enabled client the client then atthenticates
itself to the server and both machine establish an encrypted
connection ssl works on port 443 .

there are two sub protocols for ssl record layer protocol
and handshake protocol .the later version of ssl is call tls
now

Is This Answer Correct ?    17 Yes 2 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / bill gates

evryone is reuning name of ma company n ma fake too
available here......its bill gates here......roflmaoooooo

Is This Answer Correct ?    2 Yes 0 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / subasheelaq

it is used to send packet of data from sender to receiver.
it issecured sacket. it is used in tcp/ip protocols.

Is This Answer Correct ?    1 Yes 1 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / bill gates

Vinay kumar looks like a microsoft socket maker created by
bill gates. LOL

Is This Answer Correct ?    1 Yes 2 No

What is secured sucket layer and what is the requirement of its in networking..

Answer / guest

It is a socket ,created by vinay kuymar, any dout?

Is This Answer Correct ?    1 Yes 4 No

Post New Answer

More Networking Security Interview Questions

Explain how do we use rsa for both authentication and secrecy?

0 Answers  


Different Bitwin ADSL & DSL ROUTER? How To Configure

0 Answers   Samruddhi,


Why is it important to have a nac solution?

0 Answers  


What are Digrams and Trigrams

0 Answers   Elgi Equipments,


A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?

3 Answers   Wipro,






How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

0 Answers   Excel, RT Outsourcing,


Describe the term intrusion detection in the context of IT- security?

4 Answers  


What is a security mechanism?

2 Answers  


How does phishing work?

0 Answers  


SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)

4 Answers   SAP Labs,


What is BSOD?

0 Answers  


How I recover my windows 7 password? ps: When I try to log on my computer as common, the screen display the error"the user or password is incorrect"

3 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)