{"id":93220,"date":"2025-06-01T11:45:16","date_gmt":"2025-06-01T11:45:16","guid":{"rendered":"https:\/\/exam.pscnotes.com\/mcq\/?p=93220"},"modified":"2025-06-01T11:45:16","modified_gmt":"2025-06-01T11:45:16","slug":"which-one-of-the-following-protocols-is-used-for-secure-communication-2","status":"publish","type":"post","link":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/","title":{"rendered":"Which one of the following protocols is used for secure communication"},"content":{"rendered":"<p>Which one of the following protocols is used for secure communication over a computer network ?<\/p>\n<p>[amp_mcq option1=&#8221;HTTPS&#8221; option2=&#8221;HTTP&#8221; option3=&#8221;FTP&#8221; option4=&#8221;DHCP&#8221; correct=&#8221;option1&#8243;]<\/p>\n<div class=\"psc-box-pyq-exam-year-detail\">\n<div class=\"pyq-exam\">\n<div class=\"psc-heading\">This question was previously asked in<\/div>\n<div class=\"psc-title line-ellipsis\">UPSC CISF-AC-EXE &#8211; 2022<\/div>\n<\/div>\n<div class=\"pyq-exam-psc-buttons\"><a href=\"\/pyq\/pyq-upsc-cisf-ac-exe-2022.pdf\" target=\"_blank\" class=\"psc-pdf-button\" rel=\"noopener\">Download PDF<\/a><a href=\"\/pyq-upsc-cisf-ac-exe-2022\" target=\"_blank\" class=\"psc-attempt-button\" rel=\"noopener\">Attempt Online<\/a><\/div>\n<\/div>\n<section id=\"pyq-correct-answer\">\nThe correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet.<br \/>\n<\/section>\n<section id=\"pyq-key-points\">\n&#8211; HTTPS is the secure version of HTTP, where &#8216;S&#8217; stands for Secure.<br \/>\n&#8211; It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user&#8217;s browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.<br \/>\n<\/section>\n<section id=\"pyq-additional-information\">\n&#8211; HTTP (Hypertext Transfer Protocol) is the standard protocol for transmitting web pages but does not provide encryption, making it insecure for sensitive data like passwords or credit card information.<br \/>\n&#8211; FTP (File Transfer Protocol) is used for transferring files between computers. While secure versions exist (like SFTP or FTPS), the standard FTP is not secure.<br \/>\n&#8211; DHCP (Dynamic Host Configuration Protocol) is a network management protocol used for dynamically assigning IP addresses and other network configuration parameters to devices on a network. It is not a communication protocol for data transfer in the same sense as HTTP or HTTPS.<br \/>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Which one of the following protocols is used for secure communication over a computer network ? [amp_mcq option1=&#8221;HTTPS&#8221; option2=&#8221;HTTP&#8221; option3=&#8221;FTP&#8221; option4=&#8221;DHCP&#8221; correct=&#8221;option1&#8243;] This question was previously asked in UPSC CISF-AC-EXE &#8211; 2022 Download PDFAttempt Online The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Which one of the following protocols is used for secure communication\" class=\"read-more button\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/#more-93220\">Detailed Solution<span class=\"screen-reader-text\">Which one of the following protocols is used for secure communication<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1089],"tags":[1108,1113],"class_list":["post-93220","post","type-post","status-publish","format-standard","hentry","category-upsc-cisf-ac-exe","tag-1108","tag-information-and-communication-technology","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v23.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which one of the following protocols is used for secure communication<\/title>\n<meta name=\"description\" content=\"The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet. - HTTPS is the secure version of HTTP, where &#039;S&#039; stands for Secure. - It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user&#039;s browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which one of the following protocols is used for secure communication\" \/>\n<meta property=\"og:description\" content=\"The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet. - HTTPS is the secure version of HTTP, where &#039;S&#039; stands for Secure. - It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user&#039;s browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ and Quiz for Exams\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-01T11:45:16+00:00\" \/>\n<meta name=\"author\" content=\"rawan239\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rawan239\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which one of the following protocols is used for secure communication","description":"The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet. - HTTPS is the secure version of HTTP, where 'S' stands for Secure. - It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user's browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/","og_locale":"en_US","og_type":"article","og_title":"Which one of the following protocols is used for secure communication","og_description":"The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet. - HTTPS is the secure version of HTTP, where 'S' stands for Secure. - It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user's browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.","og_url":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/","og_site_name":"MCQ and Quiz for Exams","article_published_time":"2025-06-01T11:45:16+00:00","author":"rawan239","twitter_card":"summary_large_image","twitter_misc":{"Written by":"rawan239","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/","url":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/","name":"Which one of the following protocols is used for secure communication","isPartOf":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#website"},"datePublished":"2025-06-01T11:45:16+00:00","dateModified":"2025-06-01T11:45:16+00:00","author":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209"},"description":"The correct answer is HTTPS. HTTPS (Hypertext Transfer Protocol Secure) is the protocol used for secure communication over a computer network, particularly on the internet. - HTTPS is the secure version of HTTP, where 'S' stands for Secure. - It uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption to secure the connection between a user's browser and a server. This ensures that data transmitted is protected from eavesdropping and tampering.","breadcrumb":{"@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/exam.pscnotes.com\/mcq\/which-one-of-the-following-protocols-is-used-for-secure-communication-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exam.pscnotes.com\/mcq\/"},{"@type":"ListItem","position":2,"name":"UPSC CISF-AC-EXE","item":"https:\/\/exam.pscnotes.com\/mcq\/category\/upsc-cisf-ac-exe\/"},{"@type":"ListItem","position":3,"name":"Which one of the following protocols is used for secure communication"}]},{"@type":"WebSite","@id":"https:\/\/exam.pscnotes.com\/mcq\/#website","url":"https:\/\/exam.pscnotes.com\/mcq\/","name":"MCQ and Quiz for Exams","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exam.pscnotes.com\/mcq\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/5807dafeb27d2ec82344d6cbd6c3d209","name":"rawan239","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exam.pscnotes.com\/mcq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/761a7274f9cce048fa5b921221e7934820d74514df93ef195a9d22af0c1c9001?s=96&d=mm&r=g","caption":"rawan239"},"sameAs":["https:\/\/exam.pscnotes.com"],"url":"https:\/\/exam.pscnotes.com\/mcq\/author\/rawan239\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/comments?post=93220"}],"version-history":[{"count":0,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/posts\/93220\/revisions"}],"wp:attachment":[{"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/media?parent=93220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/categories?post=93220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exam.pscnotes.com\/mcq\/wp-json\/wp\/v2\/tags?post=93220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}