What applications take advantage of a DTLS protocol?
A. delay-sensitive applications, such as voice or video
B. applications that require double encryption
C. point-to-multipoint topology applications
D. applications that are unable to use TLS
What applications take advantage of a DTLS protocol?
A. delay-sensitive applications, such as voice or video
B. applications that require double encryption
C. point-to-multipoint topology applications
D. applications that are unable to use TLS