What are the two primary security protocols used by IPsec?
What will be an ideal response?
AH (Authentication Header) and ESP (Encapsulating Security Payload)
You might also like to view...
Suppose the working directory contains a single file named andor. What error message do you get when you run the following command line?
$ mv andor and\/or Under what circumstances is it possible to run the commaìnd without producing an error?
Another name for a font or font family is a(n) ____.
A. typeface B. textface C. text block D. point size
When a motion path animation is applied to an object, the object appears on the slide at the starting point of the path, indicated by a _____ circle.
A. red B. yellow C. blue D. green
____ integrity refers to a set of Access rules that govern data entry and helps to ensure data accuracy.
A. Hierarchical B. Network C. Schematic D. Referential