What is the name of the VPN protocol that is typically used as an alternative to IPsec?

A) AES
B) SSH
C) SSL
D) GRE


C
Explanation: C) Because there can be many complexities to getting IPsec to work over the Internet, it is common to utilize the Secure Sockets Layer (SSL) protocol as an alternative.

Computer Science & Information Technology

You might also like to view...

To add borders around the outside and inside edges of selected cells, click both Outline and Inside buttons in the _____ section in the Format Cells dialog box.

A. Border B. Presets C. Style D. Line

Computer Science & Information Technology

ADUC and ADAC are command line tools that can create user accounts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What VPN tunnel type uses Generic Routing Encapsulation based tunnels and can use MS-CHAPv2 or EAP-TLS for authentication?

A. PPTP B. L2TP C. SSTP D. SSLVPN

Computer Science & Information Technology

When selecting and sizing shapes, keep in mind that your audience will focus on the ____________________ shapes first.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology