Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

A. SSL
B. IPSec
C. L2TP
D. PPTP


Answer: B. IPSec

Computer Science & Information Technology

You might also like to view...

Transmission rates for dial-up connections are measured in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

A UNION clause in an SQL statement is used to ________

A) combine one or more queries B) identify the query criteria C) list the fields a query should display D) define how fields from related tables should be joined

Computer Science & Information Technology

If you want to select all customers whose names begin with the letter B, you would enter ________ as the criteria for the Customer field

Fill in the blank(s) with correct word

Computer Science & Information Technology

A computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge

A. adware B. digital certificate C. grayware D. keylogger E. dictionary attack F. social engineering G. tailgating H. Trojan I. zombie J. worm

Computer Science & Information Technology