1.Where does TLS fit on the Internet protocol stack?
2.How do applications use TLS?
3.How does TLS provide authentication? Does it provide mutual
authentication (both client and server-side)? Is that required?
4.What is the purpose of padding, Message Authentication Code
(MAC), handshake protocol, change cyber suite (CCS) protocol?
5.How does TLS provide: confidentiality, availability,
integrity, non-repudiation?
6.Is TCP a user of TLS services or does it provide services to
TLS (hard question) – explain your answer in one sentence?
7.Does...