In cybersecurity, which of the following methods is commonly used to verify the legitimacy of a server?
A) Checking the server's IP address against a blacklist
B) Verifying the server's SSL/TLS certificate
C) Ensuring the server uses a standard web browser
D) Monitoring the server's uptime and performance