ICT (10th Grade)

Networking Protocols

Which of the following protocols is used for secure data transmission?