In IPsec, key management is accomplished through a protocol known as ____.
A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP
Answer: B
You might also like to view...
_________ uses a direct connection and has speeds similar to Digital Subscriber Line (DSL) access, but it is more expensive than both DSL and cable and almost always has a data cap. A. Fixed wireless Internet access B. Conventional dial-up Internet access C. Satellite Internet access D. Mobile wireless Internet access
Fill in the blank(s) with the appropriate word(s).
In the print dialog box, the Orientation option allows you to increase or decrease the size of the item on the printed page.
Answer the following statement true (T) or false (F)
What are the two commonly available PPP authentication mechanisms?
A) PAP B) RADIUS C) TACACS+ D) CHAP
What protocol is used for reporting or informational purposes?
a. IGMP b. TCP c. ICMP d. IP