What protocol protects the authentication and confidentiality of ICMPv6 exchanges?
A. IPsec
B. WPA2
C. PPTP
D. SHA-2
Answer: A
Computer Science & Information Technology
You might also like to view...
How should you distribute data across disks?
What will be an ideal response?
Computer Science & Information Technology
These types of terminations use insulation-displacement connectors (IDC) to terminate twisted-pair cables and are commonly used in telephone systems but not computer networks.
What will be an ideal response?
Computer Science & Information Technology
Which component of EIGRP is used to track all routes advertised by its neighbors?
a. Neighbor Discovery Recovery b. DUAL Finite State Machine c. Protocol Dependent Modules d. Reliable Transport Protocol
Computer Science & Information Technology
The Ethernet frame type field tells you if the frame carries higher-level data, such as an e-mail message or Web page.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology