Answer:
The explanation for the following question is described in the explanation section below.
Explanation:
Even though TCP seems to have no authentication, if an applicator decides to transfer its signals or messages to some other mechanism that can encrypt them, instead Transport Layer is perhaps the layer where encryption was located.