IPSec ____ use a complex set of security protocols to protect information, including Internet Key Exchange (IKE), which provides for the exchange of security keys between the machines in the VPN.

A. endpoints
B. access points
C. tunnels
D. concentrators


Answer: D

Computer Science & Information Technology

You might also like to view...

Include the NAT table from PC2.

What will be an ideal response?

Computer Science & Information Technology

The Quickoffice spreadsheet editor, Quicksheet, offers some of the same functionality as Excel

Indicate whether the statement is true or false

Computer Science & Information Technology

Assume that you have a document with many subsections. Write the HTML markup to create a frame with a table of contents on the left side of the window, and have each entry in the table of contents use internal linking to scroll down the document frame to the appropriate subsection.

What will be an ideal response?

Computer Science & Information Technology

Unicode is a 32-bit system, capable of 65,536 characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology