In IPsec, authentication is accomplished by the ____ protocol.

A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP


Answer: C

Computer Science & Information Technology

You might also like to view...

Figure 5-21 is an example that’s not well aligned. Explain what you would do to improve the alignment. It may be helpful to create a photocopy of the example and draw on it.

Computer Science & Information Technology

Google+ is an example of a(n) ________ network

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not a selection of options related to downloading and installing updates?

a. Install updates automatically (recommended) b. Download updates but let me choose whether to install them c. Email me when updates are available d. Never check for updates (not recommended)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A nested decision structure can be used to test more than one condition. 2. A nested decision structure can achieve the same logic as a case structure. 3. The first line of a case structure starts with the word CASE, followed by the test expression. 4. A decision structure will produce unpredictable results if the programmer does not use proper indentation in the pseudocode. 5. An If-Then-Else statement must be used to write a single alternative decision structure.

Computer Science & Information Technology