Answer:
The explanation for the following question is described in the explanation section below.
Step-by-step explanation:
Even though TCP seems to have no authentication, if an applicator decides to transfer its signals or messages to some other mechanism that can encrypt them, instead Transport Layer is perhaps the layer where encryption was located.
- This layer protection is an acceptable use policy that promotes security and authentication when exchanging information.
- TLS would be the authentication protocol where authentication is done whenever the sender wishes to transfer his information to another mechanism that can encrypt itself.