Requesting and Receiving security statuses
Figure 3 – Requesting and Receiving security statuses