ethical-hacker video for jay, a security professional, was hired to secure the organization’s web environment from malicious activities. Jay implemented a
Jay, a security professional, was hired to secure the organization’s web environment from malicious activities. Jay implemented a domain level security protocol that sends a segment of a necessary domain name to fetch the results from a server instead of sending the complete domain name entered by a user. This protocol makes it difficult for attackers to peek at or snoop on the users’ web activities. Which of the following protocols did Jay implement in the above scenario?