Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols?
a. TLS
b. SSH
c. RSH
d. X.509
Answer: A
TLS is a security protocol that uses SSL, and it allows the use of other security protocols.