At what layer of the OSI model does the IPsec encryption protocol operate?

a. Physical layer
b. Network layer
c. Transport layer
d. Application layer


ANSWER: b

Computer Science & Information Technology

You might also like to view...

When selecting data to chart, you should not normally select the labels in the data

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?

A. Record time offset B. Clean desk policy C. Cloud computing D. Routine log review

Computer Science & Information Technology

Class D addresses are used for multicasting.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Primary memory, which holds program instructions and data, is not associated with the central processing unit (CPU).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology