The use of the Transport Layer Security (TLS) protocol enables the client in a network to be:
A. provided with a digital certificate.
B. identified by a password.
C. registered by the server.
D. assured of the server’s identity.
A. provided with a digital certificate.
B. identified by a password.
C. registered by the server.
D. assured of the server’s identity.