What is the name of the VPN protocol that is typically used as an alternative to IPsec?
A) AES
B) SSH
C) SSL
D) GRE
C
Explanation: C) Because there can be many complexities to getting IPsec to work over the Internet, it is common to utilize the Secure Sockets Layer (SSL) protocol as an alternative.
You might also like to view...
To add borders around the outside and inside edges of selected cells, click both Outline and Inside buttons in the _____ section in the Format Cells dialog box.
A. Border B. Presets C. Style D. Line
ADUC and ADAC are command line tools that can create user accounts.
Answer the following statement true (T) or false (F)
What VPN tunnel type uses Generic Routing Encapsulation based tunnels and can use MS-CHAPv2 or EAP-TLS for authentication?
A. PPTP B. L2TP C. SSTP D. SSLVPN
When selecting and sizing shapes, keep in mind that your audience will focus on the ____________________ shapes first.
Fill in the blank(s) with the appropriate word(s).