Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
A. SSL
B. IPSec
C. L2TP
D. PPTP
Answer: B. IPSec
You might also like to view...
Transmission rates for dial-up connections are measured in ________
Fill in the blank(s) with correct word
A UNION clause in an SQL statement is used to ________
A) combine one or more queries B) identify the query criteria C) list the fields a query should display D) define how fields from related tables should be joined
If you want to select all customers whose names begin with the letter B, you would enter ________ as the criteria for the Customer field
Fill in the blank(s) with correct word
A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge
A. adware B. digital certificate C. grayware D. keylogger E. dictionary attack F. social engineering G. tailgating H. Trojan I. zombie J. worm