Which component of IPsec enables computers to exchange keys to make an SA?
A. IKE
B. ISAKMP
C. Oakley
D. IPsec driver
Answer: A
You might also like to view...
Which of the following class members should usually be private?
a. Methods. b. Constructors. c. Variables (or fields). d. All of the above.
What is the algorithm approach for the problem of: "Given two jugs with the maximum capacity of i and j gallons respectively. Measure n gallons of water using these two jugs."
a. Dynamic programming b. Greedy c. Divide and conquer d. Sorting
What type of control is used to help keep controls aligned horizontally and vertically, giving forms a uniform appearance?
A) Bounded B) Layout C) Unbounded D) Calculated
The header field that can contain a security field, which enables the sender to assign a classification level to the packet is ____.
A. flags B. options C. protocol D. destination IP address