IPsec policy is determined primarily by the interaction of two databases: The security policy database and the __________ .

Fill in the blank(s) with the appropriate word(s).


security association database (SAD)

Computer Science & Information Technology

You might also like to view...

John Kultgen's wheel has ____ attributes that are deemed necessary for a vocation to be considered a profession.

A. 20 B. 14 C. 3 D. 19

Computer Science & Information Technology

As others make changes to a shared workbook, you can view and track the changes they make by viewing the details in the:

A) tracking history. B) review history. C) shared history. D) change history.

Computer Science & Information Technology

The ____________________ is the top triangle at the 0" mark on the horizontal ruler shown in the accompanying figure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Read a Web site's piracy rules before providing any personal information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology