Matt, a network engineer, is setting up an IPSec VPN. Which network-layer key management standard and its protocol can be used to negotiate the connection?

A. AH
B. Kerberos
C. EAP
D. IKE


Answer: D. IKE

Computer Science & Information Technology

You might also like to view...

Describe the concepts of slow start and congestion avoidance in TCP.

What will be an ideal response?

Computer Science & Information Technology

The ________ command can similarly be used to resolve FQDNs to IP addresses

A) lookup B) dglookup C) dig D) dng

Computer Science & Information Technology

Viewing and printing options for forms and records are available on the ____ tab.

A. HOME B. PRINT PREVIEW C. DESIGN D. FILE

Computer Science & Information Technology

Item B in the accompanying figure shows both states selected.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology