Home » which of these is not correct about an ssltls accelerator what is the recommended secure protocol for voice and video applications which of these is not correct about an ssltls accelerator what is the recommended secure protocol for voice and video applications