Defending against attacks: To simulate the Secure Socket Layer (SSL) transmission between a user and a server

Which layer of the OSI model does SSL operate in?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

What is a “man-in-the-middle” attack in SSL?
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

SSL is used for _______
Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation

Explanation