At what layer of the OSI model does the IPsec encryption protocol operate?
a. Physical layer
b. Network layer
c. Transport layer
d. Application layer
ANSWER: b
Computer Science & Information Technology
You might also like to view...
When selecting data to chart, you should not normally select the labels in the data
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?
A. Record time offset B. Clean desk policy C. Cloud computing D. Routine log review
Computer Science & Information Technology
Class D addresses are used for multicasting.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).
Answer the following statement true (T) or false (F)
Computer Science & Information Technology