Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?
A. FTPS
B. FTP
C. HTTPS
D. IP
Which of the following protocols is used by Bella?
A. FTPS
B. FTP
C. HTTPS
D. IP