A. Alert protocol
B. Handshake protocol
C. Upper-layer protocol
D. Change cipher spec protocol
Explanation: The change cipher spec protocol is bit long.
A. Alert protocol
B. Handshake protocol
C. Upper-layer protocol
D. Change cipher spec protocol
Explanation: The Change Cipher Spec Protocol is used for this action.
A. I and iii
B. Ii only
C. Ii and iii
D. Ii iii and iv
A. Select, alarm
B. Alert, alarm
C. Warning, alarm
D. Warning, fatal
Explanation: The first byte takes the value warning(1) or fatal(2) to convey the severity of the message.