Defending against attacks: To simulate the Secure Socket Layer (SSL) transmission between a user and a server
Which layer of the OSI model does SSL operate in?
What is a “man-in-the-middle” attack in SSL?
SSL is used for _______