Matt, a network engineer, is setting up an IPSec VPN. Which network-layer key management standard and its protocol can be used to negotiate the connection?
A. AH
B. Kerberos
C. EAP
D. IKE
Answer: D. IKE
Computer Science & Information Technology
You might also like to view...
Describe the concepts of slow start and congestion avoidance in TCP.
What will be an ideal response?
Computer Science & Information Technology
The ________ command can similarly be used to resolve FQDNs to IP addresses
A) lookup B) dglookup C) dig D) dng
Computer Science & Information Technology
Viewing and printing options for forms and records are available on the ____ tab.
A. HOME B. PRINT PREVIEW C. DESIGN D. FILE
Computer Science & Information Technology
Item B in the accompanying figure shows both states selected.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology