What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

a. L2TP
b. TLS
c. IPsec
d. SSL


ANSWER: c

Computer Science & Information Technology

You might also like to view...

Analyze the following code and choose the best answer :

``` public class Foo { private int x; public static void main(String[] args) { Foo foo = new Foo(); System.out.println(foo.x); } }``` a. Since x is private, it cannot be accessed from an object foo. b. Since x is defined in the class Foo, it can be accessed by any method inside the class without using an object. You can write the code to access x without creating an object such as foo in this code. c. Since x is an instance variable, it cannot be directly used inside a main method. However, it can be accessed through an object such as foo in this code. d. You cannot create a self-referenced object; that is, foo is created inside the class Foo.

Computer Science & Information Technology

Which layer of the OSI model adds source and destination MAC addresses to frames?

A. Network B. Data Link C. Transport D. Presentation

Computer Science & Information Technology

The Reliability Monitor generates a report of _____ over time.

A. problem history B. screen time C. computer usage D. warnings

Computer Science & Information Technology

Web applications, or web apps, are applications you access over the Internet using a computer or mobile device with an Internet connection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology